General

  • Target

    9fbdc3eb3cdb9d01986fe1c7391c35f3

  • Size

    14.9MB

  • Sample

    220714-fs6zvshhh5

  • MD5

    9fbdc3eb3cdb9d01986fe1c7391c35f3

  • SHA1

    f8f72269cc647c6cad855fbc13aba400ef74d0d8

  • SHA256

    b4736b94230d53ab0aa384868b7b00fa07427e18b9e8171f7b48c46ef2481c58

  • SHA512

    a0921088358285f5c71e14c801fe6ba2960bae71ceb4cbba7f1e81ebd581efce4c7d68f59e7ebf21d41246936809f1fd6a5f5ceeacc73e5c818a8cddf9b45e11

Malware Config

Targets

    • Target

      9fbdc3eb3cdb9d01986fe1c7391c35f3

    • Size

      14.9MB

    • MD5

      9fbdc3eb3cdb9d01986fe1c7391c35f3

    • SHA1

      f8f72269cc647c6cad855fbc13aba400ef74d0d8

    • SHA256

      b4736b94230d53ab0aa384868b7b00fa07427e18b9e8171f7b48c46ef2481c58

    • SHA512

      a0921088358285f5c71e14c801fe6ba2960bae71ceb4cbba7f1e81ebd581efce4c7d68f59e7ebf21d41246936809f1fd6a5f5ceeacc73e5c818a8cddf9b45e11

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks