General

  • Target

    5c31ecc6488f8d171d1028fcce1b759e99926468ed5a34043be422bcae047f89

  • Size

    1.8MB

  • Sample

    220924-zgbjcsbhg9

  • MD5

    ae747c51045b671fe640518d0f9160f1

  • SHA1

    58ca20f0dc4ad44facf333250fb68745126ab3e4

  • SHA256

    5c31ecc6488f8d171d1028fcce1b759e99926468ed5a34043be422bcae047f89

  • SHA512

    5d5a93af63941d67b4158aa4e2167f03097c2c3906a09f109c1dc8a4b4afce379c8f3d4126264cadb44515ea6b0a6d1bd428728d7b6dddb5ed031e076babc2f4

  • SSDEEP

    49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig

Score
9/10

Malware Config

Targets

    • Target

      5c31ecc6488f8d171d1028fcce1b759e99926468ed5a34043be422bcae047f89

    • Size

      1.8MB

    • MD5

      ae747c51045b671fe640518d0f9160f1

    • SHA1

      58ca20f0dc4ad44facf333250fb68745126ab3e4

    • SHA256

      5c31ecc6488f8d171d1028fcce1b759e99926468ed5a34043be422bcae047f89

    • SHA512

      5d5a93af63941d67b4158aa4e2167f03097c2c3906a09f109c1dc8a4b4afce379c8f3d4126264cadb44515ea6b0a6d1bd428728d7b6dddb5ed031e076babc2f4

    • SSDEEP

      49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig

    Score
    9/10
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks