General

  • Target

    5a3269689eeb0b116891cf656fdcdb472d452aa563bb56b9d25c1d83766c354c

  • Size

    5.3MB

  • Sample

    220802-e12vfaagb9

  • MD5

    0bff1d9de75f50b96dbad3bbee4e7813

  • SHA1

    211c9882266d68f405e03a6c65ca6c17e906e70c

  • SHA256

    5a3269689eeb0b116891cf656fdcdb472d452aa563bb56b9d25c1d83766c354c

  • SHA512

    d22984ab0ba91f20dc37cc25c82bced14b401b0c29452c62027e32659767687d64fb64c897620b44ac0e2b31c2c9b9e85065a7e5efd24aa7d5dcb456729f15c0

Malware Config

Targets

    • Target

      5a3269689eeb0b116891cf656fdcdb472d452aa563bb56b9d25c1d83766c354c

    • Size

      5.3MB

    • MD5

      0bff1d9de75f50b96dbad3bbee4e7813

    • SHA1

      211c9882266d68f405e03a6c65ca6c17e906e70c

    • SHA256

      5a3269689eeb0b116891cf656fdcdb472d452aa563bb56b9d25c1d83766c354c

    • SHA512

      d22984ab0ba91f20dc37cc25c82bced14b401b0c29452c62027e32659767687d64fb64c897620b44ac0e2b31c2c9b9e85065a7e5efd24aa7d5dcb456729f15c0

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks