General

  • Target

    792403c09d694a4c276a8403c8daa8c6f53dc6e432787d5977123d0bcc580895

  • Size

    5.9MB

  • Sample

    220802-p3g8xsgbdl

  • MD5

    dbd24e094b7e6223953c4ef07daedf64

  • SHA1

    b46b33307ae45bb63fa06c6b1077ade29c85ba63

  • SHA256

    792403c09d694a4c276a8403c8daa8c6f53dc6e432787d5977123d0bcc580895

  • SHA512

    2db2772c05b6a0c3f5b4addc2e348a9c621f8009cd8f4655c9a71dda28581415e52d09b79fb53820066910654807760b331277d36020209484073f18e611528c

Malware Config

Targets

    • Target

      792403c09d694a4c276a8403c8daa8c6f53dc6e432787d5977123d0bcc580895

    • Size

      5.9MB

    • MD5

      dbd24e094b7e6223953c4ef07daedf64

    • SHA1

      b46b33307ae45bb63fa06c6b1077ade29c85ba63

    • SHA256

      792403c09d694a4c276a8403c8daa8c6f53dc6e432787d5977123d0bcc580895

    • SHA512

      2db2772c05b6a0c3f5b4addc2e348a9c621f8009cd8f4655c9a71dda28581415e52d09b79fb53820066910654807760b331277d36020209484073f18e611528c

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks