General

  • Target

    b03ab81fd715e5f63720ecfeaefe4cce0aa1a4e455964bf5f3cfc7728db5a236

  • Size

    296KB

  • Sample

    221126-zdfnxafh6x

  • MD5

    5ba8c5594acd396176fd2d5b7bb8af6b

  • SHA1

    437753354ad6ffe383882e4d85089a887c5c6e32

  • SHA256

    b03ab81fd715e5f63720ecfeaefe4cce0aa1a4e455964bf5f3cfc7728db5a236

  • SHA512

    977ac03d5766b5c1162c7624765b1716b76dadac8820c2c0c257dc02645eb97dcedd775859b4030d3119a0a3f54346d7f7cbb5adb04a2a607adeb9884e927d1d

  • SSDEEP

    6144:KdAUtnJuC7JjSQ7Ek1t29xZb4fuusuOHW8tcm+kgnW2iCnroS4blBNvUsFmo:Ebn8C7JmnxZbeu4CWIv+kUvsD/NvUsF1

Score
9/10

Malware Config

Targets

    • Target

      b03ab81fd715e5f63720ecfeaefe4cce0aa1a4e455964bf5f3cfc7728db5a236

    • Size

      296KB

    • MD5

      5ba8c5594acd396176fd2d5b7bb8af6b

    • SHA1

      437753354ad6ffe383882e4d85089a887c5c6e32

    • SHA256

      b03ab81fd715e5f63720ecfeaefe4cce0aa1a4e455964bf5f3cfc7728db5a236

    • SHA512

      977ac03d5766b5c1162c7624765b1716b76dadac8820c2c0c257dc02645eb97dcedd775859b4030d3119a0a3f54346d7f7cbb5adb04a2a607adeb9884e927d1d

    • SSDEEP

      6144:KdAUtnJuC7JjSQ7Ek1t29xZb4fuusuOHW8tcm+kgnW2iCnroS4blBNvUsFmo:Ebn8C7JmnxZbeu4CWIv+kUvsD/NvUsF1

    Score
    9/10
    • Looks for VirtualBox Guest Additions in registry

    • Executes dropped EXE

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

2
T1082

Tasks