General

  • Target

    GiftCard-Generator_SETUP.rar

  • Size

    3.3MB

  • Sample

    220625-sec6vaefc5

  • MD5

    1d3179c4b244a2af073370ca0b710987

  • SHA1

    424b8f0554d14eddf81194c4cf78b973963d63f1

  • SHA256

    3f786bdb79bf519691bd9857cd423915f9ee2b251d604785f7228e06b6b35969

  • SHA512

    fc2850493825ba10ae6252267baf18926736118dcab1ecbe414843b33845cc132b45a776183fc61480d0a39e3cd45706057d9585c5225e651fec0de4188d1595

Malware Config

Targets

    • Target

      GiftCard-Generator_SETUP.exe

    • Size

      3.3MB

    • MD5

      9e0728736c39c9aad664eaa7fadd1320

    • SHA1

      268e1488c03755b9f2ed506c46c855001327a80d

    • SHA256

      6895ceb670704f09844ef6c808a95510aabbe765362ff5cb98a7369d04fb27c9

    • SHA512

      3e4179bb7ae411967a34ea2a81c76f29c89a82726f636dd2ce43383d97d94c22130f382a6ce76d5181239e154fd7439894989f0a806db45e2ed49cca77103948

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks