General

  • Target

    4529c2d4d0915e5c32a543aaa81ed2d509eb9d0733e7f0e333a11d461e51ddf4

  • Size

    5.9MB

  • Sample

    220802-p3hvfsgbdm

  • MD5

    3beb0d24e3206c726b6c20f46cef688e

  • SHA1

    f4dd0f8972f1ab1d9703bc6257480c5b6d0b62f8

  • SHA256

    4529c2d4d0915e5c32a543aaa81ed2d509eb9d0733e7f0e333a11d461e51ddf4

  • SHA512

    5a43e7a2c628c5e3973120b64ebe0f18dee6b20ae2c9ac910787bee34babbd95ae39d7180e9b6a6e746d2f24552790bd7022ddf652c0d59d94b720ba1f92e5cd

Malware Config

Targets

    • Target

      4529c2d4d0915e5c32a543aaa81ed2d509eb9d0733e7f0e333a11d461e51ddf4

    • Size

      5.9MB

    • MD5

      3beb0d24e3206c726b6c20f46cef688e

    • SHA1

      f4dd0f8972f1ab1d9703bc6257480c5b6d0b62f8

    • SHA256

      4529c2d4d0915e5c32a543aaa81ed2d509eb9d0733e7f0e333a11d461e51ddf4

    • SHA512

      5a43e7a2c628c5e3973120b64ebe0f18dee6b20ae2c9ac910787bee34babbd95ae39d7180e9b6a6e746d2f24552790bd7022ddf652c0d59d94b720ba1f92e5cd

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks