General

  • Target

    Launcher.exe

  • Size

    3.7MB

  • Sample

    220811-tlr41sbfc7

  • MD5

    26de3aeeabe0ae76f1018eaa2532f16a

  • SHA1

    cb64725485be721627e11871cbb7fb6a778beb2d

  • SHA256

    1492ef6536804555c64804636662313d4345fcf02d7d568c2cc291f221915ed7

  • SHA512

    4b1ea404e601a3990ff2abf97c273c4a23205a30f5bdf2cc78706efcb3cfd7e20157fa9071cade58f39ce3206db56185ca523780fd16d167a2d6f3fd4e6eb118

Malware Config

Targets

    • Target

      Launcher.exe

    • Size

      3.7MB

    • MD5

      26de3aeeabe0ae76f1018eaa2532f16a

    • SHA1

      cb64725485be721627e11871cbb7fb6a778beb2d

    • SHA256

      1492ef6536804555c64804636662313d4345fcf02d7d568c2cc291f221915ed7

    • SHA512

      4b1ea404e601a3990ff2abf97c273c4a23205a30f5bdf2cc78706efcb3cfd7e20157fa9071cade58f39ce3206db56185ca523780fd16d167a2d6f3fd4e6eb118

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks