General

  • Target

    fc1a3019551235ad7643ea61afb149356a36d0cd03b375b5c9434c3270306e59

  • Size

    5.9MB

  • Sample

    220802-p3hjpaehf3

  • MD5

    943ba6acbdbeb3b0fda85f3f93983bc4

  • SHA1

    eb26323a38c0114175ab44f65c659c528c03f9ef

  • SHA256

    fc1a3019551235ad7643ea61afb149356a36d0cd03b375b5c9434c3270306e59

  • SHA512

    eacd134975762f96c3653d8b2e35ca323eccee930593bb1c89ca395eb720a81a05aba3e9c06c31a500ebcbe661f5fe56c62a08bb4b71ec2623a25e4f0d1a69d2

Malware Config

Targets

    • Target

      fc1a3019551235ad7643ea61afb149356a36d0cd03b375b5c9434c3270306e59

    • Size

      5.9MB

    • MD5

      943ba6acbdbeb3b0fda85f3f93983bc4

    • SHA1

      eb26323a38c0114175ab44f65c659c528c03f9ef

    • SHA256

      fc1a3019551235ad7643ea61afb149356a36d0cd03b375b5c9434c3270306e59

    • SHA512

      eacd134975762f96c3653d8b2e35ca323eccee930593bb1c89ca395eb720a81a05aba3e9c06c31a500ebcbe661f5fe56c62a08bb4b71ec2623a25e4f0d1a69d2

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks