General

  • Target

    a4e593aea24f1009619f9654df3089787399ee9102339b4179d26ad02c31b46e

  • Size

    1.6MB

  • Sample

    220520-2zk7mabcbp

  • MD5

    e2933973d5377c0b683e11c2c52bf9cc

  • SHA1

    03e02075f92bf89a98519595db3186d33059d15c

  • SHA256

    a4e593aea24f1009619f9654df3089787399ee9102339b4179d26ad02c31b46e

  • SHA512

    89a750426eb524dbb8bb32c32fec4bdb4b5239faa0508bd74e63779f92a777183a941a6836b1a32e09ad9abea06cb416c5cee1c954edf9dcc377419d2bdbb962

Score
9/10

Malware Config

Targets

    • Target

      a4e593aea24f1009619f9654df3089787399ee9102339b4179d26ad02c31b46e

    • Size

      1.6MB

    • MD5

      e2933973d5377c0b683e11c2c52bf9cc

    • SHA1

      03e02075f92bf89a98519595db3186d33059d15c

    • SHA256

      a4e593aea24f1009619f9654df3089787399ee9102339b4179d26ad02c31b46e

    • SHA512

      89a750426eb524dbb8bb32c32fec4bdb4b5239faa0508bd74e63779f92a777183a941a6836b1a32e09ad9abea06cb416c5cee1c954edf9dcc377419d2bdbb962

    Score
    9/10
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

1
T1082

Tasks