General

  • Target

    9324bf5638c2d795e4e713d813720f21037c8423917c85dba8b3703efc187bd2dll

  • Size

    2.8MB

  • Sample

    220620-kzsg9sbfgr

  • MD5

    bfbca5e7c072f0bb4f25de1c71dffd5e

  • SHA1

    d789e53c9c9f66eba65fba6e7dff2aedc21f12c0

  • SHA256

    9324bf5638c2d795e4e713d813720f21037c8423917c85dba8b3703efc187bd2

  • SHA512

    ae387de8357ad467809cfec2947a3455be8b7194cd7e31b619e090d88a8ed19cb050b3f123ab9f3fd1a1c7c905ac803f8ed073049ea4a4d54eea144fabbc9ca6

Malware Config

Targets

    • Target

      9324bf5638c2d795e4e713d813720f21037c8423917c85dba8b3703efc187bd2dll

    • Size

      2.8MB

    • MD5

      bfbca5e7c072f0bb4f25de1c71dffd5e

    • SHA1

      d789e53c9c9f66eba65fba6e7dff2aedc21f12c0

    • SHA256

      9324bf5638c2d795e4e713d813720f21037c8423917c85dba8b3703efc187bd2

    • SHA512

      ae387de8357ad467809cfec2947a3455be8b7194cd7e31b619e090d88a8ed19cb050b3f123ab9f3fd1a1c7c905ac803f8ed073049ea4a4d54eea144fabbc9ca6

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks