General

  • Target

    5bd3d8b3aac3565a9a07fe0b888adc186fd3afab24b8f5545e91a745503d13a6

  • Size

    5.2MB

  • Sample

    220801-t2n3asedcr

  • MD5

    fe47daf12c57b5b65f30a5722ac813f8

  • SHA1

    0640dd5724df5f2817f983d33a0f6bab6dfd5dbe

  • SHA256

    5bd3d8b3aac3565a9a07fe0b888adc186fd3afab24b8f5545e91a745503d13a6

  • SHA512

    fab667e805e14c5ca56b0ee128885ff78f13c3826a2580eeaaa3212353db335b4f12fbf78dca137a21b11f9bc17f3611b51fa6c6f79fcb682ebd4fb45e9ca3d6

Malware Config

Targets

    • Target

      5bd3d8b3aac3565a9a07fe0b888adc186fd3afab24b8f5545e91a745503d13a6

    • Size

      5.2MB

    • MD5

      fe47daf12c57b5b65f30a5722ac813f8

    • SHA1

      0640dd5724df5f2817f983d33a0f6bab6dfd5dbe

    • SHA256

      5bd3d8b3aac3565a9a07fe0b888adc186fd3afab24b8f5545e91a745503d13a6

    • SHA512

      fab667e805e14c5ca56b0ee128885ff78f13c3826a2580eeaaa3212353db335b4f12fbf78dca137a21b11f9bc17f3611b51fa6c6f79fcb682ebd4fb45e9ca3d6

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks