General

  • Target

    sample

  • Size

    540KB

  • Sample

    220802-l2rt7adfc6

  • MD5

    558d9e65ebd71435611c1eaa956fc0af

  • SHA1

    b0a96923dfbf4dcee4be681c666efb0550a0b5fc

  • SHA256

    6edf58e55464a347de7f6aa1cee75198cf1d89f399665ca75ebbe891088761cf

  • SHA512

    6dec3439b253940a58fc50c0064670feeb01a5f4d979c86fb8f9070d6b4ff7555341b9e9339342013c22c8c5fc68c97c111ac4c9bf0cc67b336b96f22a175e30

Malware Config

Targets

    • Target

      sample

    • Size

      540KB

    • MD5

      558d9e65ebd71435611c1eaa956fc0af

    • SHA1

      b0a96923dfbf4dcee4be681c666efb0550a0b5fc

    • SHA256

      6edf58e55464a347de7f6aa1cee75198cf1d89f399665ca75ebbe891088761cf

    • SHA512

      6dec3439b253940a58fc50c0064670feeb01a5f4d979c86fb8f9070d6b4ff7555341b9e9339342013c22c8c5fc68c97c111ac4c9bf0cc67b336b96f22a175e30

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Sets desktop wallpaper using registry

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

3
T1112

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

5
T1082

Impact

Defacement

1
T1491

Tasks