General

  • Target

    4ef945fd32cf250232ef9269f349844f652af3b79f9f05d45495c80d507b8324

  • Size

    3.4MB

  • Sample

    220806-l984fadeer

  • MD5

    b67da452eabdb5202468322d11b07c01

  • SHA1

    698f6779381714ec3c7d19840da6a679da918e84

  • SHA256

    4ef945fd32cf250232ef9269f349844f652af3b79f9f05d45495c80d507b8324

  • SHA512

    2d4547769f16537ca5e9a9c1beba7ee7047594b1789a25223855a9f86fe1eafdf005d69c57b63f5ff65bbad12052226782e5d558323590057d4eac2f90091205

Malware Config

Targets

    • Target

      4ef945fd32cf250232ef9269f349844f652af3b79f9f05d45495c80d507b8324

    • Size

      3.4MB

    • MD5

      b67da452eabdb5202468322d11b07c01

    • SHA1

      698f6779381714ec3c7d19840da6a679da918e84

    • SHA256

      4ef945fd32cf250232ef9269f349844f652af3b79f9f05d45495c80d507b8324

    • SHA512

      2d4547769f16537ca5e9a9c1beba7ee7047594b1789a25223855a9f86fe1eafdf005d69c57b63f5ff65bbad12052226782e5d558323590057d4eac2f90091205

    • Detected Stratum cryptominer command

      Looks to be attempting to contact Stratum mining pool.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Uses the VBS compiler for execution

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Scripting

1
T1064

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks