General

  • Target

    025a0e46c447aec1e55ba9b149083187817bcd12634028247b7e1e7357f9f79b

  • Size

    5.7MB

  • Sample

    220802-qthnrsgfaj

  • MD5

    7454b156d4fd55e6b9474e3dab36ffec

  • SHA1

    276733e38d79f7e235b09428ae77d704757468eb

  • SHA256

    025a0e46c447aec1e55ba9b149083187817bcd12634028247b7e1e7357f9f79b

  • SHA512

    1ca5c1b97c845befa51d3568e772869a0e9d917d560821b7826e00b37f4719a9fcf921631c2a23f04e9d147ce7a665f3f4a48b5c72ed6c18c1fe5df57c3751dc

Malware Config

Targets

    • Target

      025a0e46c447aec1e55ba9b149083187817bcd12634028247b7e1e7357f9f79b

    • Size

      5.7MB

    • MD5

      7454b156d4fd55e6b9474e3dab36ffec

    • SHA1

      276733e38d79f7e235b09428ae77d704757468eb

    • SHA256

      025a0e46c447aec1e55ba9b149083187817bcd12634028247b7e1e7357f9f79b

    • SHA512

      1ca5c1b97c845befa51d3568e772869a0e9d917d560821b7826e00b37f4719a9fcf921631c2a23f04e9d147ce7a665f3f4a48b5c72ed6c18c1fe5df57c3751dc

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

5
T1082

Tasks