General

  • Target

    32a7dc2a385867fa2224c6e58f8a64102e0bff1147fed2707a9c48e38e8666d2

  • Size

    2.7MB

  • Sample

    220212-kpqwpaaca8

  • MD5

    908cfbc12ebc4d187f8d262b53e8ca3e

  • SHA1

    01bcf5796c5a95fd02ec237de3326f09dbd4c12b

  • SHA256

    32a7dc2a385867fa2224c6e58f8a64102e0bff1147fed2707a9c48e38e8666d2

  • SHA512

    e18aaf8bc06dc3b096963228ab7cf2ed652c30efd0d4f441607401849f171866eb59c05446835c0707226d36131ffdf8e0f9d641de8b8427393e7335b73ffdec

Malware Config

Targets

    • Target

      32a7dc2a385867fa2224c6e58f8a64102e0bff1147fed2707a9c48e38e8666d2

    • Size

      2.7MB

    • MD5

      908cfbc12ebc4d187f8d262b53e8ca3e

    • SHA1

      01bcf5796c5a95fd02ec237de3326f09dbd4c12b

    • SHA256

      32a7dc2a385867fa2224c6e58f8a64102e0bff1147fed2707a9c48e38e8666d2

    • SHA512

      e18aaf8bc06dc3b096963228ab7cf2ed652c30efd0d4f441607401849f171866eb59c05446835c0707226d36131ffdf8e0f9d641de8b8427393e7335b73ffdec

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks