General

  • Target

    8e4f483813f36549b509bc6fac6037ba6592f0186efee0024a05bae4cd5e8c7f

  • Size

    5.9MB

  • Sample

    220802-p3h58aehf6

  • MD5

    5d94ec2c9e1a5a48cbc4d82f5961129f

  • SHA1

    71b9fea881448d0c307a484d5c6e9331962903bd

  • SHA256

    8e4f483813f36549b509bc6fac6037ba6592f0186efee0024a05bae4cd5e8c7f

  • SHA512

    a8df474ab58358a805713c771093807c0c03319bb7d3607aba323c7f705c881e3294229f2c6d8c7f5d49f9c163287f72f057083a6071e9a6f7f011ac1eec6147

Malware Config

Targets

    • Target

      8e4f483813f36549b509bc6fac6037ba6592f0186efee0024a05bae4cd5e8c7f

    • Size

      5.9MB

    • MD5

      5d94ec2c9e1a5a48cbc4d82f5961129f

    • SHA1

      71b9fea881448d0c307a484d5c6e9331962903bd

    • SHA256

      8e4f483813f36549b509bc6fac6037ba6592f0186efee0024a05bae4cd5e8c7f

    • SHA512

      a8df474ab58358a805713c771093807c0c03319bb7d3607aba323c7f705c881e3294229f2c6d8c7f5d49f9c163287f72f057083a6071e9a6f7f011ac1eec6147

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks