General

  • Target

    otkepwxaym.lsa

  • Size

    9.3MB

  • Sample

    220715-m5pdxaaac9

  • MD5

    c7f0ee90d71cd00a7709f409a4bb027d

  • SHA1

    bdb0a4f52cf7b270befc926f28f606e4df6d6225

  • SHA256

    e7db2ba32e4620a34b83de0bc5a728b8e3934f8d3e659785f48888a3930a3412

  • SHA512

    2d84cbee27f8c6a1c8630a232a7eef9ff1bcce15e30b02cd37321528e87a5897c42d38c17a9cc84580e995fd2262bada588d3286c4eda6e3f84919fddb0f644d

Malware Config

Targets

    • Target

      otkepwxaym.lsa

    • Size

      9.3MB

    • MD5

      c7f0ee90d71cd00a7709f409a4bb027d

    • SHA1

      bdb0a4f52cf7b270befc926f28f606e4df6d6225

    • SHA256

      e7db2ba32e4620a34b83de0bc5a728b8e3934f8d3e659785f48888a3930a3412

    • SHA512

      2d84cbee27f8c6a1c8630a232a7eef9ff1bcce15e30b02cd37321528e87a5897c42d38c17a9cc84580e995fd2262bada588d3286c4eda6e3f84919fddb0f644d

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks