General

  • Target

    19533bf0ecccd56fefb33af9f4ba7d8b3a11046b9b0e88d3671a2a2653ae619c.dll

  • Size

    5.2MB

  • Sample

    220621-r5ab7sgfg4

  • MD5

    9a9e31dcf05385a8d07124321cf2ae36

  • SHA1

    805bd322e28fe6ebb3b6d5edece0122b9cc585f1

  • SHA256

    19533bf0ecccd56fefb33af9f4ba7d8b3a11046b9b0e88d3671a2a2653ae619c

  • SHA512

    7ed845cc9465eacf6a0526db6a4a5129925e546206d87b8b51589679069a01db1190446a5610c7709a3a7748cfbf2a1a83e7f0cd2cccf8c80f2e35edeef8f8fb

Malware Config

Targets

    • Target

      19533bf0ecccd56fefb33af9f4ba7d8b3a11046b9b0e88d3671a2a2653ae619c.dll

    • Size

      5.2MB

    • MD5

      9a9e31dcf05385a8d07124321cf2ae36

    • SHA1

      805bd322e28fe6ebb3b6d5edece0122b9cc585f1

    • SHA256

      19533bf0ecccd56fefb33af9f4ba7d8b3a11046b9b0e88d3671a2a2653ae619c

    • SHA512

      7ed845cc9465eacf6a0526db6a4a5129925e546206d87b8b51589679069a01db1190446a5610c7709a3a7748cfbf2a1a83e7f0cd2cccf8c80f2e35edeef8f8fb

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks