General

  • Target

    aad3072a367a7b47c0ef0472bde70721f5aff5285dbd40310bb19c7b68ff3918

  • Size

    5.9MB

  • Sample

    220802-p3gx6agbdk

  • MD5

    0584dab798512e3053948814accbb6f9

  • SHA1

    082ad7c7d350757e107841aa77402fbef12dd10c

  • SHA256

    aad3072a367a7b47c0ef0472bde70721f5aff5285dbd40310bb19c7b68ff3918

  • SHA512

    23783cb0cd26b1a257bb57ef4cbb5ff48250159eed176823f027c1cda7b8eb66508e5361e1347bfda02b7b6b34e5fe573bdbfc0c7dd3226a8bfb471ce366d9d8

Malware Config

Targets

    • Target

      aad3072a367a7b47c0ef0472bde70721f5aff5285dbd40310bb19c7b68ff3918

    • Size

      5.9MB

    • MD5

      0584dab798512e3053948814accbb6f9

    • SHA1

      082ad7c7d350757e107841aa77402fbef12dd10c

    • SHA256

      aad3072a367a7b47c0ef0472bde70721f5aff5285dbd40310bb19c7b68ff3918

    • SHA512

      23783cb0cd26b1a257bb57ef4cbb5ff48250159eed176823f027c1cda7b8eb66508e5361e1347bfda02b7b6b34e5fe573bdbfc0c7dd3226a8bfb471ce366d9d8

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks