General

  • Target

    4867822a4f3b6a5863c1a3e407ca09aae29fed5be1e4fb6bdce6f25432d329dc

  • Size

    5.9MB

  • Sample

    220802-p3284agbek

  • MD5

    e708e555e05c3d53a782200991a1984b

  • SHA1

    419a0fcccea429405631bb93d223a3319fb3fcee

  • SHA256

    4867822a4f3b6a5863c1a3e407ca09aae29fed5be1e4fb6bdce6f25432d329dc

  • SHA512

    c74fe985e1fe6f6ad160bc6c58822e312d00308064c18f8e97ce497ed20f178e60ea854445b4a27ea4a4624045df5a76ae773b41443929cd98638fd2be5021e8

Malware Config

Targets

    • Target

      4867822a4f3b6a5863c1a3e407ca09aae29fed5be1e4fb6bdce6f25432d329dc

    • Size

      5.9MB

    • MD5

      e708e555e05c3d53a782200991a1984b

    • SHA1

      419a0fcccea429405631bb93d223a3319fb3fcee

    • SHA256

      4867822a4f3b6a5863c1a3e407ca09aae29fed5be1e4fb6bdce6f25432d329dc

    • SHA512

      c74fe985e1fe6f6ad160bc6c58822e312d00308064c18f8e97ce497ed20f178e60ea854445b4a27ea4a4624045df5a76ae773b41443929cd98638fd2be5021e8

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks