General

  • Target

    a996768d37f61da0f070b737cc8227cfe761b14e681d7e33aa5700f6e1eda501

  • Size

    3.2MB

  • Sample

    220708-jmdmxaaaa4

  • MD5

    9e3c55a06a5f9ec09c4a3499fb09fd51

  • SHA1

    72593f15194b3ab2875eb03823934b4d489eaf22

  • SHA256

    a996768d37f61da0f070b737cc8227cfe761b14e681d7e33aa5700f6e1eda501

  • SHA512

    ac77a3ed3d88659a5be71294427f199eb6d78fd88c2da28ca6ae226c25e5b6153adbb01384fc611acab4282d650ad17c62b1db62bfb78691fde3d57cb794ffba

Malware Config

Targets

    • Target

      a996768d37f61da0f070b737cc8227cfe761b14e681d7e33aa5700f6e1eda501

    • Size

      3.2MB

    • MD5

      9e3c55a06a5f9ec09c4a3499fb09fd51

    • SHA1

      72593f15194b3ab2875eb03823934b4d489eaf22

    • SHA256

      a996768d37f61da0f070b737cc8227cfe761b14e681d7e33aa5700f6e1eda501

    • SHA512

      ac77a3ed3d88659a5be71294427f199eb6d78fd88c2da28ca6ae226c25e5b6153adbb01384fc611acab4282d650ad17c62b1db62bfb78691fde3d57cb794ffba

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks