General

  • Target

    6b20615de24c054915f24d7d8c1dd0db7e9bab6ec58032aaa2a8c1744c6b0352

  • Size

    5.7MB

  • Sample

    220802-p2xl8aehd2

  • MD5

    07b8562e454313bd0d59510ceb2283cf

  • SHA1

    ec2e0bd71a55dd81d4db528a4cf9e7f9d79ffb51

  • SHA256

    6b20615de24c054915f24d7d8c1dd0db7e9bab6ec58032aaa2a8c1744c6b0352

  • SHA512

    70e14d8c4c13a5f38b4eb44c88f94c44271826cd69c354e5ae12bd222bb71a3c66fd10e5ec9c4da4f66e2c2ea1865cd6b40aa2031b0e74bca960510fc634186b

Malware Config

Targets

    • Target

      6b20615de24c054915f24d7d8c1dd0db7e9bab6ec58032aaa2a8c1744c6b0352

    • Size

      5.7MB

    • MD5

      07b8562e454313bd0d59510ceb2283cf

    • SHA1

      ec2e0bd71a55dd81d4db528a4cf9e7f9d79ffb51

    • SHA256

      6b20615de24c054915f24d7d8c1dd0db7e9bab6ec58032aaa2a8c1744c6b0352

    • SHA512

      70e14d8c4c13a5f38b4eb44c88f94c44271826cd69c354e5ae12bd222bb71a3c66fd10e5ec9c4da4f66e2c2ea1865cd6b40aa2031b0e74bca960510fc634186b

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks