General

  • Target

    4207e417818bdbfc1bfdaabf5743f83e1c948496de5fa9ed33d1ba9d51fe0c28

  • Size

    2.7MB

  • Sample

    220708-edmf8sacd9

  • MD5

    02aab72d361c343d872955a7273ccc6e

  • SHA1

    15407003145002974aabb374b1b025af3023623d

  • SHA256

    4207e417818bdbfc1bfdaabf5743f83e1c948496de5fa9ed33d1ba9d51fe0c28

  • SHA512

    e6d5ec7896289fdeb0426ae2dde5ba401b489ca9ef6c8d3f6e314b4b880866e443128a20d5402c1d17a588befc82fc08f2d78875eb87f9f56b8d30ecdd7eed36

Malware Config

Targets

    • Target

      4207e417818bdbfc1bfdaabf5743f83e1c948496de5fa9ed33d1ba9d51fe0c28

    • Size

      2.7MB

    • MD5

      02aab72d361c343d872955a7273ccc6e

    • SHA1

      15407003145002974aabb374b1b025af3023623d

    • SHA256

      4207e417818bdbfc1bfdaabf5743f83e1c948496de5fa9ed33d1ba9d51fe0c28

    • SHA512

      e6d5ec7896289fdeb0426ae2dde5ba401b489ca9ef6c8d3f6e314b4b880866e443128a20d5402c1d17a588befc82fc08f2d78875eb87f9f56b8d30ecdd7eed36

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks