General

  • Target

    20ad6ebb675a70f37ad9e019108a818463b67174119641f160b2c7f39f35f8e3

  • Size

    6.5MB

  • Sample

    220725-vjss7sbebl

  • MD5

    68aebec982d6d6df5af8a0e66e0b1213

  • SHA1

    44e42b332e9b65a431ca63941d372698c1f5b7d8

  • SHA256

    20ad6ebb675a70f37ad9e019108a818463b67174119641f160b2c7f39f35f8e3

  • SHA512

    5eda091a925b6f151cd2fb7619cd315782d2c16798f3b870a8d870e8aba72abd71a199feab8a700851198168a1b845012173ca47763fe80324233a544c792b1d

Malware Config

Targets

    • Target

      20ad6ebb675a70f37ad9e019108a818463b67174119641f160b2c7f39f35f8e3

    • Size

      6.5MB

    • MD5

      68aebec982d6d6df5af8a0e66e0b1213

    • SHA1

      44e42b332e9b65a431ca63941d372698c1f5b7d8

    • SHA256

      20ad6ebb675a70f37ad9e019108a818463b67174119641f160b2c7f39f35f8e3

    • SHA512

      5eda091a925b6f151cd2fb7619cd315782d2c16798f3b870a8d870e8aba72abd71a199feab8a700851198168a1b845012173ca47763fe80324233a544c792b1d

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks