General

  • Target

    e24c10a0c58fef55a56d4870871293eac41effcddbe269baf9e9867b468f3b7c

  • Size

    1.8MB

  • Sample

    220809-f293wadedn

  • MD5

    82847af8b38ffd417e272c3de40e2329

  • SHA1

    4b6be6a36ff45f59ca97a4eeb05a8123035e9cf8

  • SHA256

    e24c10a0c58fef55a56d4870871293eac41effcddbe269baf9e9867b468f3b7c

  • SHA512

    9030cdc2824b606f895fe3c0155745b862ef8eeb2da09d3b8e08b947488ceaa1a7d2cdf6321b0fcf57d1439c0523582d60657312b3fc8d1d4897a99d541ea763

Score
9/10

Malware Config

Targets

    • Target

      e24c10a0c58fef55a56d4870871293eac41effcddbe269baf9e9867b468f3b7c

    • Size

      1.8MB

    • MD5

      82847af8b38ffd417e272c3de40e2329

    • SHA1

      4b6be6a36ff45f59ca97a4eeb05a8123035e9cf8

    • SHA256

      e24c10a0c58fef55a56d4870871293eac41effcddbe269baf9e9867b468f3b7c

    • SHA512

      9030cdc2824b606f895fe3c0155745b862ef8eeb2da09d3b8e08b947488ceaa1a7d2cdf6321b0fcf57d1439c0523582d60657312b3fc8d1d4897a99d541ea763

    Score
    9/10
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks