General

  • Target

    CodSpoofer.exe

  • Size

    9.7MB

  • Sample

    220626-f4ls3agffn

  • MD5

    b73b703a7bad26a004520bfc2f7d9991

  • SHA1

    44be69e21740f9aef70a552a9d9a1bc204238f18

  • SHA256

    db68bfffa183ba56793f6ed4500ce565d89ce08ba08e4b649afe806b2e3448e8

  • SHA512

    e3c36978bfaeb1692d207c48e8b62cc0ada935a3285980b254857d649491f11d06030abcda2144a2ea21be102b9e88a9fe53cca852a348c3ad03ad1bdf0364da

Malware Config

Targets

    • Target

      CodSpoofer.exe

    • Size

      9.7MB

    • MD5

      b73b703a7bad26a004520bfc2f7d9991

    • SHA1

      44be69e21740f9aef70a552a9d9a1bc204238f18

    • SHA256

      db68bfffa183ba56793f6ed4500ce565d89ce08ba08e4b649afe806b2e3448e8

    • SHA512

      e3c36978bfaeb1692d207c48e8b62cc0ada935a3285980b254857d649491f11d06030abcda2144a2ea21be102b9e88a9fe53cca852a348c3ad03ad1bdf0364da

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks