General

  • Target

    akbniwuioi.wlw

  • Size

    14.8MB

  • Sample

    220712-hmjy9ahhe9

  • MD5

    3115421f75bd8bd9040584df66224088

  • SHA1

    d8c766ff795a9debdc63a29a8b31374d97b5ab21

  • SHA256

    964c0163ba31f0c703efc7d449a6a51c569624f540bef6df11cf6d1215b828fa

  • SHA512

    65e14c372ac2158e94e808bc098f7195dbe1d6e8f0e7813708841d0999a2ca901448dc037f0779007efb6a153fb42065dd3a1151fa6afe573bbe91df188fb05a

Malware Config

Targets

    • Target

      akbniwuioi.wlw

    • Size

      14.8MB

    • MD5

      3115421f75bd8bd9040584df66224088

    • SHA1

      d8c766ff795a9debdc63a29a8b31374d97b5ab21

    • SHA256

      964c0163ba31f0c703efc7d449a6a51c569624f540bef6df11cf6d1215b828fa

    • SHA512

      65e14c372ac2158e94e808bc098f7195dbe1d6e8f0e7813708841d0999a2ca901448dc037f0779007efb6a153fb42065dd3a1151fa6afe573bbe91df188fb05a

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks