General

  • Target

    dce6b541c822235cc52b2ba927e40fa39bfcbdab834870936dee131785994d93

  • Size

    3.3MB

  • Sample

    220215-f7q7yscfhm

  • MD5

    c43f57a26092d31ef02696f8850b4960

  • SHA1

    5fd387f4f5d73fd84a28c121bff7e0d05b42789e

  • SHA256

    dce6b541c822235cc52b2ba927e40fa39bfcbdab834870936dee131785994d93

  • SHA512

    a17253d004d8b6e355e49d32d0997636291935936a85656fef0686ba7585af314a275f51bf89c7687c51b7e791e7391d60166da187b43e5b54af0d4cbf33b76c

Malware Config

Targets

    • Target

      dce6b541c822235cc52b2ba927e40fa39bfcbdab834870936dee131785994d93

    • Size

      3.3MB

    • MD5

      c43f57a26092d31ef02696f8850b4960

    • SHA1

      5fd387f4f5d73fd84a28c121bff7e0d05b42789e

    • SHA256

      dce6b541c822235cc52b2ba927e40fa39bfcbdab834870936dee131785994d93

    • SHA512

      a17253d004d8b6e355e49d32d0997636291935936a85656fef0686ba7585af314a275f51bf89c7687c51b7e791e7391d60166da187b43e5b54af0d4cbf33b76c

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops startup file

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks