General

  • Target

    4c8e8d525ca06a318c7845c658b9d8fd417f2b7b4c386659ac295a0b07125c7a

  • Size

    3.4MB

  • Sample

    220215-qv95eafdc6

  • MD5

    240dc3df45fd2233148581beb6cdb4b1

  • SHA1

    6a565becd793e09d7a69ff2a116f821ddc2d79b1

  • SHA256

    4c8e8d525ca06a318c7845c658b9d8fd417f2b7b4c386659ac295a0b07125c7a

  • SHA512

    0ff80f8192e3bda22f303b78eef624cd2b48fe0bc611c7acdfa48f4cd06b7bc1fcaa60710e8dcae6ccccd35bc0be3ac3e38d12c6e8e8e2d184b412d9a4e9bc52

Malware Config

Targets

    • Target

      4c8e8d525ca06a318c7845c658b9d8fd417f2b7b4c386659ac295a0b07125c7a

    • Size

      3.4MB

    • MD5

      240dc3df45fd2233148581beb6cdb4b1

    • SHA1

      6a565becd793e09d7a69ff2a116f821ddc2d79b1

    • SHA256

      4c8e8d525ca06a318c7845c658b9d8fd417f2b7b4c386659ac295a0b07125c7a

    • SHA512

      0ff80f8192e3bda22f303b78eef624cd2b48fe0bc611c7acdfa48f4cd06b7bc1fcaa60710e8dcae6ccccd35bc0be3ac3e38d12c6e8e8e2d184b412d9a4e9bc52

    • Modifies security service

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

2
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Virtualization/Sandbox Evasion

1
T1497

Install Root Certificate

1
T1130

Discovery

Query Registry

5
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

6
T1082

Command and Control

Web Service

1
T1102

Tasks