General

  • Target

    13482256037ee18f3d3657886f783497e366143ac11ef004b1cada52689d586b

  • Size

    2.7MB

  • Sample

    220215-swv3zshfhm

  • MD5

    341d41e4ba22d8fe29678e679c9be3fa

  • SHA1

    8c239c023836c3690c2c5a261015313b5ba8573b

  • SHA256

    13482256037ee18f3d3657886f783497e366143ac11ef004b1cada52689d586b

  • SHA512

    dc58add4e71c8eef883c159a06ac75321caa430e2404af95447f8c21daa2c0b5bb995a8b92fdda00beeb31465ca314ca8741bf7fd49f53dce8525346a9b078ac

Malware Config

Targets

    • Target

      13482256037ee18f3d3657886f783497e366143ac11ef004b1cada52689d586b

    • Size

      2.7MB

    • MD5

      341d41e4ba22d8fe29678e679c9be3fa

    • SHA1

      8c239c023836c3690c2c5a261015313b5ba8573b

    • SHA256

      13482256037ee18f3d3657886f783497e366143ac11ef004b1cada52689d586b

    • SHA512

      dc58add4e71c8eef883c159a06ac75321caa430e2404af95447f8c21daa2c0b5bb995a8b92fdda00beeb31465ca314ca8741bf7fd49f53dce8525346a9b078ac

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks