General

  • Target

    Acunetix Premium Activation Tool.exe

  • Size

    6.2MB

  • Sample

    220720-a4d6bshha2

  • MD5

    0537e883d76c11df03adfe93ae6d5500

  • SHA1

    f3090d8e68e8c35ed7e35a862759e3f444f0320c

  • SHA256

    24354524397121389a297ac8a7c1af8b7d3fd9f9caf6f21975557b6d0e531091

  • SHA512

    1f44e1acb1a1b66ca988f8233f10fc531c1f71303856ac9e442cc7f950894b8da37e40a89c99bd8cf1f27a85148033ef8bc1068060d6e5a052e60e64010f8380

Malware Config

Targets

    • Target

      Acunetix Premium Activation Tool.exe

    • Size

      6.2MB

    • MD5

      0537e883d76c11df03adfe93ae6d5500

    • SHA1

      f3090d8e68e8c35ed7e35a862759e3f444f0320c

    • SHA256

      24354524397121389a297ac8a7c1af8b7d3fd9f9caf6f21975557b6d0e531091

    • SHA512

      1f44e1acb1a1b66ca988f8233f10fc531c1f71303856ac9e442cc7f950894b8da37e40a89c99bd8cf1f27a85148033ef8bc1068060d6e5a052e60e64010f8380

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Drops file in Drivers directory

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

2
T1112

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

4
T1082

Command and Control

Web Service

1
T1102

Tasks