General

  • Target

    cfba16fa9aa7fdc7b744b2832ef65558d8d9934171f0d6e902e7a423d800b50f

  • Size

    2.4MB

  • Sample

    220521-x4bfrschb5

  • MD5

    cd9f18209f2d8ef60e8199662b2ea120

  • SHA1

    bbf36d27902a379ae5e204babde0cb330934a6cc

  • SHA256

    cfba16fa9aa7fdc7b744b2832ef65558d8d9934171f0d6e902e7a423d800b50f

  • SHA512

    621d3d82f04aebb6cf4ffc7e012ddfc05c1bd677eb3b018a8b37bec6812762d2b6617bcb7c9af4fe235a43219b1b20aeb84e677cd3899840c4a24ce548b70586

Malware Config

Targets

    • Target

      cfba16fa9aa7fdc7b744b2832ef65558d8d9934171f0d6e902e7a423d800b50f

    • Size

      2.4MB

    • MD5

      cd9f18209f2d8ef60e8199662b2ea120

    • SHA1

      bbf36d27902a379ae5e204babde0cb330934a6cc

    • SHA256

      cfba16fa9aa7fdc7b744b2832ef65558d8d9934171f0d6e902e7a423d800b50f

    • SHA512

      621d3d82f04aebb6cf4ffc7e012ddfc05c1bd677eb3b018a8b37bec6812762d2b6617bcb7c9af4fe235a43219b1b20aeb84e677cd3899840c4a24ce548b70586

    Score
    9/10
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks