General

  • Target

    11eee5f2ffbdd3b080f11b90e3ab186a0b2c7f318f55b4cb32fe2f137a469c89

  • Size

    1.8MB

  • Sample

    220923-bkyajagfbp

  • MD5

    12ccf4bfa8a6917d8fea0f001947251b

  • SHA1

    827c0ab37d0f1ae37e140756194709a8b5c6a0f5

  • SHA256

    11eee5f2ffbdd3b080f11b90e3ab186a0b2c7f318f55b4cb32fe2f137a469c89

  • SHA512

    e0b63277e196d0f76f9429ee1075237d75c519481110986a4f98504c418f9ba390c0d4d452c9befd5bd2c7f29f3d2ba587eb0fb37a6a51b00cafd0b62e27ec82

  • SSDEEP

    49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig

Score
9/10

Malware Config

Targets

    • Target

      11eee5f2ffbdd3b080f11b90e3ab186a0b2c7f318f55b4cb32fe2f137a469c89

    • Size

      1.8MB

    • MD5

      12ccf4bfa8a6917d8fea0f001947251b

    • SHA1

      827c0ab37d0f1ae37e140756194709a8b5c6a0f5

    • SHA256

      11eee5f2ffbdd3b080f11b90e3ab186a0b2c7f318f55b4cb32fe2f137a469c89

    • SHA512

      e0b63277e196d0f76f9429ee1075237d75c519481110986a4f98504c418f9ba390c0d4d452c9befd5bd2c7f29f3d2ba587eb0fb37a6a51b00cafd0b62e27ec82

    • SSDEEP

      49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig

    Score
    9/10
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks