General

  • Target

    32bits.zip

  • Size

    7.0MB

  • Sample

    220718-ss2flahbfp

  • MD5

    2a921b291a8cceca101b70ec97db2e60

  • SHA1

    dde4bb204ec730bbc02749189f73b7d0809eb53f

  • SHA256

    63c5aa3e26fdc571f328f9c8a5e2c518b6f0611110270eb4b224ee99dfe0c416

  • SHA512

    a0bdaf91b4b7a6b761a7a3734e4678a15478413ebca783de0a2a8a398220616b551f13609a26a5f5fe6339782265e8421b593c8c403b11b834a9374220fd6e94

Malware Config

Targets

    • Target

      gcpfqzsczq.dop

    • Size

      6.8MB

    • MD5

      cb0e540176159268be4986459091576a

    • SHA1

      c512c14e8a2afb15636e7b4c6f30284646b8d456

    • SHA256

      fbe44a3401b91f4fa23f2df40e6844931bfc1e8931fefcf301b786788b44a6f4

    • SHA512

      a04fc5b10b46bd2cec4ce3ec48b29ca87e3137a3f5e2d3575d18a6282c98a6c9e9e7c9316494fbeb1a4e30ce24842d41c074c3d4c3c122e0378f8259b25a4b1a

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      ms9s539qhd0628mgfggg

    • Size

      884KB

    • MD5

      4685811c853ceaebc991c3a8406694bf

    • SHA1

      9cd382eb91bfea5782dd09f589a31b47c2c2b53e

    • SHA256

      3242e0a736ef8ac90430a9f272ff30a81e2afc146fcb84a25c6e56e8192791e4

    • SHA512

      a504fbca674f15d8964ebc6fac11d9431d700ca22736c00d5bb1e51551b0d2b9e4b2b6824bdf1a778111a0ba8d2601eada2f726b9ec7a9cfa5a53fd43c235b46

    Score
    1/10

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks