General

  • Target

    770BF3AB1DC6DE5A37D759FA9AA5F867.fil

  • Size

    5.7MB

  • Sample

    220722-xal1eahag9

  • MD5

    770bf3ab1dc6de5a37d759fa9aa5f867

  • SHA1

    6d2fcd2922aef5d2e054def3ac3c6ad92eaa178e

  • SHA256

    2b998702dcdd8f3c6d44605ef479b40dc4ec47d89462663c0eaa71f9a55918b4

  • SHA512

    39de40b328262a0cb6af5e573e169921d305d0074a26244e03f52ecf73688349bedcdaa634b19bf9ef361e5184a49c783a75208de2027ad92d7c5c9f63df7a63

Malware Config

Targets

    • Target

      770BF3AB1DC6DE5A37D759FA9AA5F867.fil

    • Size

      5.7MB

    • MD5

      770bf3ab1dc6de5a37d759fa9aa5f867

    • SHA1

      6d2fcd2922aef5d2e054def3ac3c6ad92eaa178e

    • SHA256

      2b998702dcdd8f3c6d44605ef479b40dc4ec47d89462663c0eaa71f9a55918b4

    • SHA512

      39de40b328262a0cb6af5e573e169921d305d0074a26244e03f52ecf73688349bedcdaa634b19bf9ef361e5184a49c783a75208de2027ad92d7c5c9f63df7a63

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks