General

  • Target

    efd0988cb5a3516b25d2ebe89481e83326e8e3d057b121f710c114caaa4abc68

  • Size

    1.8MB

  • Sample

    220809-f39thafch5

  • MD5

    9fc6cc266ed0b4d02189f62f10d9dbed

  • SHA1

    7adf72d438cd7b1bf5a38b9f8ab9bf83dccec5d1

  • SHA256

    efd0988cb5a3516b25d2ebe89481e83326e8e3d057b121f710c114caaa4abc68

  • SHA512

    611e9e22a38752d480771f3c7c19fa6e9439cfc3d03b8af11a68b37ae7b0c671805c1b5ed3957fdeb241e200fbd78444319cd8127d923d674de9bf7636133839

Score
9/10

Malware Config

Targets

    • Target

      efd0988cb5a3516b25d2ebe89481e83326e8e3d057b121f710c114caaa4abc68

    • Size

      1.8MB

    • MD5

      9fc6cc266ed0b4d02189f62f10d9dbed

    • SHA1

      7adf72d438cd7b1bf5a38b9f8ab9bf83dccec5d1

    • SHA256

      efd0988cb5a3516b25d2ebe89481e83326e8e3d057b121f710c114caaa4abc68

    • SHA512

      611e9e22a38752d480771f3c7c19fa6e9439cfc3d03b8af11a68b37ae7b0c671805c1b5ed3957fdeb241e200fbd78444319cd8127d923d674de9bf7636133839

    Score
    9/10
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks