General

  • Target

    0e929d54884b69ef02800a614975708c744bd7021e96500b096e3900289a0b03

  • Size

    3.0MB

  • Sample

    220520-2q4ydafgh4

  • MD5

    cba7dbb4c5f3dd636291517d2d231d33

  • SHA1

    28930e02a7bdc9c7214c220aee418050681c6150

  • SHA256

    0e929d54884b69ef02800a614975708c744bd7021e96500b096e3900289a0b03

  • SHA512

    9fea3db8a766ce1a3a6cfeefd8b2ae19548eb60878f5845dd901dd732d5cc38f4a838998b3fe6ce1c0001a59f54548b5ff22ff0adc7450750865eef6509d3b82

Score
9/10

Malware Config

Targets

    • Target

      0e929d54884b69ef02800a614975708c744bd7021e96500b096e3900289a0b03

    • Size

      3.0MB

    • MD5

      cba7dbb4c5f3dd636291517d2d231d33

    • SHA1

      28930e02a7bdc9c7214c220aee418050681c6150

    • SHA256

      0e929d54884b69ef02800a614975708c744bd7021e96500b096e3900289a0b03

    • SHA512

      9fea3db8a766ce1a3a6cfeefd8b2ae19548eb60878f5845dd901dd732d5cc38f4a838998b3fe6ce1c0001a59f54548b5ff22ff0adc7450750865eef6509d3b82

    Score
    9/10
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

1
T1082

Tasks