General

  • Target

    f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e

  • Size

    5.2MB

  • Sample

    221122-lckpksca5x

  • MD5

    bcbb46256a4af7b5509b2924be449bc3

  • SHA1

    1692917c482954c43a5b0127fc1b4c939fe7cbd2

  • SHA256

    f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e

  • SHA512

    4c87f101ffeaf0a6692e2adb98e83713a68a5aa8bfe83b5c6ef19b787631eb19b707c4cd8935e8eb0770154dd0e92389c61c657c36fc2d6ba62e903b2bb6b450

  • SSDEEP

    98304:z5E5IoBr0SdozMevlC5J0xTSdR7QISNVVhiiXk04QVKLg+5yG:z099ozMedC56SdR7QISNdk04JLp5yG

Malware Config

Targets

    • Target

      f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e

    • Size

      5.2MB

    • MD5

      bcbb46256a4af7b5509b2924be449bc3

    • SHA1

      1692917c482954c43a5b0127fc1b4c939fe7cbd2

    • SHA256

      f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e

    • SHA512

      4c87f101ffeaf0a6692e2adb98e83713a68a5aa8bfe83b5c6ef19b787631eb19b707c4cd8935e8eb0770154dd0e92389c61c657c36fc2d6ba62e903b2bb6b450

    • SSDEEP

      98304:z5E5IoBr0SdozMevlC5J0xTSdR7QISNVVhiiXk04QVKLg+5yG:z099ozMedC56SdR7QISNdk04JLp5yG

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks