General

  • Target

    015143a07d91ffa0f512d16171583fd511292d8abf58d7a24d059a9fcf742e10

  • Size

    1.8MB

  • Sample

    220925-g29msaehak

  • MD5

    af4506a03e2061f0364930cda1007f68

  • SHA1

    02864d02caf2b512ba20e9b38046f974a98355d2

  • SHA256

    015143a07d91ffa0f512d16171583fd511292d8abf58d7a24d059a9fcf742e10

  • SHA512

    e58c8be46a5f288a58cebb17adfb84d1325efb641f0e66ba8f91d6295ba4602a0fda6b12d5863dbe36a385488210efbea7a6a753f0912d311c79523f65877e22

  • SSDEEP

    49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig

Score
9/10

Malware Config

Targets

    • Target

      015143a07d91ffa0f512d16171583fd511292d8abf58d7a24d059a9fcf742e10

    • Size

      1.8MB

    • MD5

      af4506a03e2061f0364930cda1007f68

    • SHA1

      02864d02caf2b512ba20e9b38046f974a98355d2

    • SHA256

      015143a07d91ffa0f512d16171583fd511292d8abf58d7a24d059a9fcf742e10

    • SHA512

      e58c8be46a5f288a58cebb17adfb84d1325efb641f0e66ba8f91d6295ba4602a0fda6b12d5863dbe36a385488210efbea7a6a753f0912d311c79523f65877e22

    • SSDEEP

      49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig

    Score
    9/10
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks