General

  • Target

    091e2f9e98f85a667be7612ababd1627ab4dccd979e0d61e2cd617cae5fed19d

  • Size

    5.9MB

  • Sample

    220802-p3hvfsehf4

  • MD5

    d9491ef83fba3d37ca9ba1bb3c26ef1b

  • SHA1

    163f97449c71fd4f9f5e7a7ed75b34404560525a

  • SHA256

    091e2f9e98f85a667be7612ababd1627ab4dccd979e0d61e2cd617cae5fed19d

  • SHA512

    e09f72328abfea0d7378dac8e0eb05ff95400592d744fb47a8d8a7b58f1705dc15e511cb12dcf6973994c0ddbf5a3bd95ccf619560d1125095ae88180c272748

Malware Config

Targets

    • Target

      091e2f9e98f85a667be7612ababd1627ab4dccd979e0d61e2cd617cae5fed19d

    • Size

      5.9MB

    • MD5

      d9491ef83fba3d37ca9ba1bb3c26ef1b

    • SHA1

      163f97449c71fd4f9f5e7a7ed75b34404560525a

    • SHA256

      091e2f9e98f85a667be7612ababd1627ab4dccd979e0d61e2cd617cae5fed19d

    • SHA512

      e09f72328abfea0d7378dac8e0eb05ff95400592d744fb47a8d8a7b58f1705dc15e511cb12dcf6973994c0ddbf5a3bd95ccf619560d1125095ae88180c272748

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks