General

  • Target

    4704353d7891b4ce26d4a0cf994be73bddead85ce028ca1228a0ef1110c675a1

  • Size

    5.9MB

  • Sample

    220802-p3h58agbdp

  • MD5

    2c5614f158f75fa9c609b0b3a20adc8c

  • SHA1

    f309060d2bd6a76bceb3233d52973bebe70635e1

  • SHA256

    4704353d7891b4ce26d4a0cf994be73bddead85ce028ca1228a0ef1110c675a1

  • SHA512

    df3c9831ae15f2633cfedf2aa6272a723800a3669ef7c695af710ffd083be5e47232f5fecfcd40a9256ba8e0b112bb90750124fccccaf8580d50c58b45594248

Malware Config

Targets

    • Target

      4704353d7891b4ce26d4a0cf994be73bddead85ce028ca1228a0ef1110c675a1

    • Size

      5.9MB

    • MD5

      2c5614f158f75fa9c609b0b3a20adc8c

    • SHA1

      f309060d2bd6a76bceb3233d52973bebe70635e1

    • SHA256

      4704353d7891b4ce26d4a0cf994be73bddead85ce028ca1228a0ef1110c675a1

    • SHA512

      df3c9831ae15f2633cfedf2aa6272a723800a3669ef7c695af710ffd083be5e47232f5fecfcd40a9256ba8e0b112bb90750124fccccaf8580d50c58b45594248

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks