General

  • Target

    13bfd151744e2b8205c1c44f017cbf8702554778df5609341e8b29b9538d364e

  • Size

    1.8MB

  • Sample

    220930-rgtqyaefer

  • MD5

    cc40cda389654f4e0de53241439123fb

  • SHA1

    7b8d973d7ab7e4f4c1f535d135bb54bff9a78fc5

  • SHA256

    13bfd151744e2b8205c1c44f017cbf8702554778df5609341e8b29b9538d364e

  • SHA512

    5a478e55b280e0f991e6770a353986836184d648c90f4f004bb4889538dede259b2679f54a8a3864e5d74dc053db6f4adf603e4f4e8a980aea9be374c6572e42

  • SSDEEP

    49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig

Score
9/10

Malware Config

Targets

    • Target

      13bfd151744e2b8205c1c44f017cbf8702554778df5609341e8b29b9538d364e

    • Size

      1.8MB

    • MD5

      cc40cda389654f4e0de53241439123fb

    • SHA1

      7b8d973d7ab7e4f4c1f535d135bb54bff9a78fc5

    • SHA256

      13bfd151744e2b8205c1c44f017cbf8702554778df5609341e8b29b9538d364e

    • SHA512

      5a478e55b280e0f991e6770a353986836184d648c90f4f004bb4889538dede259b2679f54a8a3864e5d74dc053db6f4adf603e4f4e8a980aea9be374c6572e42

    • SSDEEP

      49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig

    Score
    9/10
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks