General

  • Target

    38548dbae19167b9959b25826e86a6601b7841654fc99eea3b9b00b475b71f1a

  • Size

    2.8MB

  • Sample

    220212-kjydksabf2

  • MD5

    07310dfb28f4c92c90a4ee204d9fefb7

  • SHA1

    2902eb08e48b2f8a7972dbc44297cf04812da59b

  • SHA256

    38548dbae19167b9959b25826e86a6601b7841654fc99eea3b9b00b475b71f1a

  • SHA512

    c2579a3a6e0b1376570e88c99f1a42cbc818409b6dfc617baae72161711803bd294e4ea858e3c1287bb82fef34737fffdc80236d79974c3c2264cabc98ae1dd5

Malware Config

Targets

    • Target

      38548dbae19167b9959b25826e86a6601b7841654fc99eea3b9b00b475b71f1a

    • Size

      2.8MB

    • MD5

      07310dfb28f4c92c90a4ee204d9fefb7

    • SHA1

      2902eb08e48b2f8a7972dbc44297cf04812da59b

    • SHA256

      38548dbae19167b9959b25826e86a6601b7841654fc99eea3b9b00b475b71f1a

    • SHA512

      c2579a3a6e0b1376570e88c99f1a42cbc818409b6dfc617baae72161711803bd294e4ea858e3c1287bb82fef34737fffdc80236d79974c3c2264cabc98ae1dd5

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks