General

  • Target

    wp.zip

  • Size

    9.3MB

  • Sample

    220715-m443zabbdr

  • MD5

    619fe6bc3fe8bfc1fa26b4f1977f3987

  • SHA1

    5dcb81abe5a509e14b880fc80374583ea84f4cd3

  • SHA256

    ced56f87e7c86b11bf18d8ef62fe812c678c945edcc0316cd45da91751bacbba

  • SHA512

    9fda3ca3c215e0f4696d38c84ebfdb5d7435791876b29f1338d30be22761b64cde44068aafaef045b29822acb3dcc5b2e619b9a455aafef78308a237c53ab2d0

Malware Config

Targets

    • Target

      i9bkj6ztwy63173urjltlll

    • Size

      884KB

    • MD5

      4685811c853ceaebc991c3a8406694bf

    • SHA1

      9cd382eb91bfea5782dd09f589a31b47c2c2b53e

    • SHA256

      3242e0a736ef8ac90430a9f272ff30a81e2afc146fcb84a25c6e56e8192791e4

    • SHA512

      a504fbca674f15d8964ebc6fac11d9431d700ca22736c00d5bb1e51551b0d2b9e4b2b6824bdf1a778111a0ba8d2601eada2f726b9ec7a9cfa5a53fd43c235b46

    Score
    1/10
    • Target

      otkepwxaym.lsa

    • Size

      9.3MB

    • MD5

      c7f0ee90d71cd00a7709f409a4bb027d

    • SHA1

      bdb0a4f52cf7b270befc926f28f606e4df6d6225

    • SHA256

      e7db2ba32e4620a34b83de0bc5a728b8e3934f8d3e659785f48888a3930a3412

    • SHA512

      2d84cbee27f8c6a1c8630a232a7eef9ff1bcce15e30b02cd37321528e87a5897c42d38c17a9cc84580e995fd2262bada588d3286c4eda6e3f84919fddb0f644d

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks