General

  • Target

    69c69d71a7e334f8ef9d47e7b32d701a0ecd22ce79e0c11dabbc837c9e0fedc2

  • Size

    2.4MB

  • Sample

    220521-x39xyachb4

  • MD5

    defcde0fc4d0bcabd6cc08593ac180bd

  • SHA1

    edbc8ed017837cb273842ca47e6ded4616ebd24f

  • SHA256

    69c69d71a7e334f8ef9d47e7b32d701a0ecd22ce79e0c11dabbc837c9e0fedc2

  • SHA512

    8e5e1137de7bfcb4c0962f82aab6c76d6e92c233337c85c03afe7ad72ffdd3db79a46be44b58bdba28c13b75299dcf839a0b96366c4a0d188c13bbe57e5c9885

Malware Config

Targets

    • Target

      69c69d71a7e334f8ef9d47e7b32d701a0ecd22ce79e0c11dabbc837c9e0fedc2

    • Size

      2.4MB

    • MD5

      defcde0fc4d0bcabd6cc08593ac180bd

    • SHA1

      edbc8ed017837cb273842ca47e6ded4616ebd24f

    • SHA256

      69c69d71a7e334f8ef9d47e7b32d701a0ecd22ce79e0c11dabbc837c9e0fedc2

    • SHA512

      8e5e1137de7bfcb4c0962f82aab6c76d6e92c233337c85c03afe7ad72ffdd3db79a46be44b58bdba28c13b75299dcf839a0b96366c4a0d188c13bbe57e5c9885

    Score
    9/10
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks