General

  • Target

    34add4fab2a9952f6ea195fc9309fc4cd0e903a61b5144d7ca5087b934433329

  • Size

    9.6MB

  • Sample

    220707-gcyh8adhgp

  • MD5

    4212f1e5c8506f2eb0fcaa4a54a0889a

  • SHA1

    211c5f9f888da7bea913537a5ee1e9c90e255ef0

  • SHA256

    34add4fab2a9952f6ea195fc9309fc4cd0e903a61b5144d7ca5087b934433329

  • SHA512

    aa2de1cb65ccba1bf196cfeff0818da95d1815566979745fc6275dc4d3a308cb3c456b1aa3a0ab2d5dbc3a62614388c78b02d0963001ba23abfe3d64a7278c99

Malware Config

Targets

    • Target

      34add4fab2a9952f6ea195fc9309fc4cd0e903a61b5144d7ca5087b934433329

    • Size

      9.6MB

    • MD5

      4212f1e5c8506f2eb0fcaa4a54a0889a

    • SHA1

      211c5f9f888da7bea913537a5ee1e9c90e255ef0

    • SHA256

      34add4fab2a9952f6ea195fc9309fc4cd0e903a61b5144d7ca5087b934433329

    • SHA512

      aa2de1cb65ccba1bf196cfeff0818da95d1815566979745fc6275dc4d3a308cb3c456b1aa3a0ab2d5dbc3a62614388c78b02d0963001ba23abfe3d64a7278c99

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks