General

  • Target

    e539edfc388879c786f774a7a7c7a0399f6525820211194f6faad57423417942

  • Size

    741KB

  • Sample

    220520-17bgqahhej

  • MD5

    0e3401b0ddd0f9fd1459420faacc0886

  • SHA1

    5e9eb107954805300467a3980dfb8814610b5fef

  • SHA256

    e539edfc388879c786f774a7a7c7a0399f6525820211194f6faad57423417942

  • SHA512

    86674190091b05272979a61d6b637df1cfeb7d08786c16cbc4e7b822b4adb8bfaeb0c780ecad5068daf61efd4107b0c0d20c78e48b4c4200ce3389627f13010c

Score
9/10

Malware Config

Targets

    • Target

      AKH8536375001TGz_仰贸易上海有限公司_dwg.exe

    • Size

      859KB

    • MD5

      a20ed75cdd3f8ce28737aa9fb8a9c3b2

    • SHA1

      d8dfa5b7cdea4105f9b5ae5c8d78a4d47b5472c4

    • SHA256

      d17de71fad23c19ea4e181c8fe33be0fc230d15be13e6d3c755c77e7ff1519d5

    • SHA512

      afb6ab77e640ed37fa11fecdbfb79bdaef331d5dc58e27e73e04ac3d4668bb9d50bd1bfe72eef30dc04e757f61b3dd1b0d50dd1871b597ea08191bc64352c3dd

    Score
    9/10
    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

7
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

6
T1082

Peripheral Device Discovery

1
T1120

Tasks