General

  • Target

    595728d3602df8a2930eeb36232f43624d93049d5793ea8acf98964427f0f532

  • Size

    3.2MB

  • Sample

    220215-qerm5agebq

  • MD5

    b3a3605b1768e34126afb8cb065a1ef9

  • SHA1

    1aa6029292bf5c72b03e62ec8708ba992da0ec9b

  • SHA256

    595728d3602df8a2930eeb36232f43624d93049d5793ea8acf98964427f0f532

  • SHA512

    f8c5cc965ea6c4fd660934d5c074849c6d20ec5e5bea2d0b8dae609bc88147f11d91cc2b994f8e60ff08eaed28cd57a5cbf272ea5a6b7522ed2c2e9adf22d8bd

Score
10/10

Malware Config

Targets

    • Target

      595728d3602df8a2930eeb36232f43624d93049d5793ea8acf98964427f0f532

    • Size

      3.2MB

    • MD5

      b3a3605b1768e34126afb8cb065a1ef9

    • SHA1

      1aa6029292bf5c72b03e62ec8708ba992da0ec9b

    • SHA256

      595728d3602df8a2930eeb36232f43624d93049d5793ea8acf98964427f0f532

    • SHA512

      f8c5cc965ea6c4fd660934d5c074849c6d20ec5e5bea2d0b8dae609bc88147f11d91cc2b994f8e60ff08eaed28cd57a5cbf272ea5a6b7522ed2c2e9adf22d8bd

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops startup file

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

5
T1082

Tasks