General

  • Target

    9caf75f016fd5b18b506d28b688650204c7edc476b3b27504d66b61762c391fc

  • Size

    1.8MB

  • Sample

    221003-c59pqscfd3

  • MD5

    b1d321854309cbc2be71c1321b5a0752

  • SHA1

    fa08bda9030d3b41a7eb08ea9b6e3f644579ffdb

  • SHA256

    9caf75f016fd5b18b506d28b688650204c7edc476b3b27504d66b61762c391fc

  • SHA512

    2f29c9a318e5c846507780231a6830a1b439a0218131342eeb5a817e81432fe8602ce4398865a2b3831fe0a5d9c3133f0232ea884e5fffc861e806d4bb25b515

  • SSDEEP

    49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig

Score
9/10

Malware Config

Targets

    • Target

      9caf75f016fd5b18b506d28b688650204c7edc476b3b27504d66b61762c391fc

    • Size

      1.8MB

    • MD5

      b1d321854309cbc2be71c1321b5a0752

    • SHA1

      fa08bda9030d3b41a7eb08ea9b6e3f644579ffdb

    • SHA256

      9caf75f016fd5b18b506d28b688650204c7edc476b3b27504d66b61762c391fc

    • SHA512

      2f29c9a318e5c846507780231a6830a1b439a0218131342eeb5a817e81432fe8602ce4398865a2b3831fe0a5d9c3133f0232ea884e5fffc861e806d4bb25b515

    • SSDEEP

      49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig

    Score
    9/10
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks