General

  • Target

    d3379b78f72c4d706cc5c4d4c2014322dc484c15768abc91c7d3f67f8a7448da

  • Size

    5.9MB

  • Sample

    220802-p3g8xsehe7

  • MD5

    1a3d56b85808cfd70ce4fc16f08e2985

  • SHA1

    ab0141d6dfc701e63cb4968fcd2ba4026385d064

  • SHA256

    d3379b78f72c4d706cc5c4d4c2014322dc484c15768abc91c7d3f67f8a7448da

  • SHA512

    7ca95f92a280c2d10dab16bfd06dd27baaa91566cc0075ce5a6f15826e4d796e7bd4681c9f74485944d9f95bfec8252711731ce99501f974aaead9acaa489ae1

Malware Config

Targets

    • Target

      d3379b78f72c4d706cc5c4d4c2014322dc484c15768abc91c7d3f67f8a7448da

    • Size

      5.9MB

    • MD5

      1a3d56b85808cfd70ce4fc16f08e2985

    • SHA1

      ab0141d6dfc701e63cb4968fcd2ba4026385d064

    • SHA256

      d3379b78f72c4d706cc5c4d4c2014322dc484c15768abc91c7d3f67f8a7448da

    • SHA512

      7ca95f92a280c2d10dab16bfd06dd27baaa91566cc0075ce5a6f15826e4d796e7bd4681c9f74485944d9f95bfec8252711731ce99501f974aaead9acaa489ae1

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks