General

  • Target

    6c98b5bffd2f5ce6e666272ac4a71fe885b931f49ea46aa2bad7370178967fe7

  • Size

    5.9MB

  • Sample

    220802-p3g8xsehe8

  • MD5

    c313d53fa46232eda3ae3110405208c5

  • SHA1

    e08b27c7dce34a572c457beee171018fab002298

  • SHA256

    6c98b5bffd2f5ce6e666272ac4a71fe885b931f49ea46aa2bad7370178967fe7

  • SHA512

    6cc0549098e2407263b1eb1d2725e6df2a30b371453c5a72ab35ebb9dfaba5cf7f73fa29f3925fb613cceaf4f2feaf3e6080c7a0969f15c1876f4d3486959da8

Malware Config

Targets

    • Target

      6c98b5bffd2f5ce6e666272ac4a71fe885b931f49ea46aa2bad7370178967fe7

    • Size

      5.9MB

    • MD5

      c313d53fa46232eda3ae3110405208c5

    • SHA1

      e08b27c7dce34a572c457beee171018fab002298

    • SHA256

      6c98b5bffd2f5ce6e666272ac4a71fe885b931f49ea46aa2bad7370178967fe7

    • SHA512

      6cc0549098e2407263b1eb1d2725e6df2a30b371453c5a72ab35ebb9dfaba5cf7f73fa29f3925fb613cceaf4f2feaf3e6080c7a0969f15c1876f4d3486959da8

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks