General

  • Target

    b156409f4fce371d73516dd46ea70166869f96ae8422d51389376cea77f51643

  • Size

    5.9MB

  • Sample

    220802-p3h58aehf7

  • MD5

    aabd2598e548ceabe8182ced634dfef3

  • SHA1

    ae6843378d520c58e42742caf28728d3c516755f

  • SHA256

    b156409f4fce371d73516dd46ea70166869f96ae8422d51389376cea77f51643

  • SHA512

    40455b3f63b4d0b0a939d023a8a6112b2371f7084dab741ca969faf6f5cb64aa49af306ef36aacc0ccb9964b1d51515441acbdfe6177e9958afd1e8b8b9f38f4

Malware Config

Targets

    • Target

      b156409f4fce371d73516dd46ea70166869f96ae8422d51389376cea77f51643

    • Size

      5.9MB

    • MD5

      aabd2598e548ceabe8182ced634dfef3

    • SHA1

      ae6843378d520c58e42742caf28728d3c516755f

    • SHA256

      b156409f4fce371d73516dd46ea70166869f96ae8422d51389376cea77f51643

    • SHA512

      40455b3f63b4d0b0a939d023a8a6112b2371f7084dab741ca969faf6f5cb64aa49af306ef36aacc0ccb9964b1d51515441acbdfe6177e9958afd1e8b8b9f38f4

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks