General

  • Target

    b321417ec7f94af2711101f2a8966b1667ecac9e3c68133119d8371fb42dba7a

  • Size

    1.8MB

  • Sample

    220809-f11g2sdeck

  • MD5

    1cf5749fad04f0f16260ac8e53baa075

  • SHA1

    4d122685bcacc79f782a5fbac225a454f5ea63f9

  • SHA256

    b321417ec7f94af2711101f2a8966b1667ecac9e3c68133119d8371fb42dba7a

  • SHA512

    0abc2c5ee8f9cb07d962343d7f43453838465add2dc3dced0a61ae86168322fde80d9170b2d4c94b263d7733382e42de13b6cfadfd6137ed8c5d3f762617330b

Score
9/10

Malware Config

Targets

    • Target

      b321417ec7f94af2711101f2a8966b1667ecac9e3c68133119d8371fb42dba7a

    • Size

      1.8MB

    • MD5

      1cf5749fad04f0f16260ac8e53baa075

    • SHA1

      4d122685bcacc79f782a5fbac225a454f5ea63f9

    • SHA256

      b321417ec7f94af2711101f2a8966b1667ecac9e3c68133119d8371fb42dba7a

    • SHA512

      0abc2c5ee8f9cb07d962343d7f43453838465add2dc3dced0a61ae86168322fde80d9170b2d4c94b263d7733382e42de13b6cfadfd6137ed8c5d3f762617330b

    Score
    9/10
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks