General

  • Target

    frAQBc8W.exe

  • Size

    4.4MB

  • Sample

    230314-ew13cadc24

  • MD5

    c5e25683bad6530516b83b00c6332788

  • SHA1

    4cb7f56d9332b8d3dd2bbe65b231f27d52598620

  • SHA256

    f065d31c557335cad992a806aad8adb893ee2b35de8ab3b206290006991f354f

  • SHA512

    440c4191797704bae1609092631dd5dfdefd71c84281facd921cd6b19cbc1e52c781b2c0864d08871558e9788cdec0b38bcd1d701aa0432a9360e52eff775646

  • SSDEEP

    98304:aUTa4GtDOPFiDyqc1RxZ3mYmZix9nSz8cQGDtE6pQacW8KPOXxK:H2DOPFiDyqc1UiS8mLpaoOXxK

Malware Config

Targets

    • Target

      frAQBc8W.exe

    • Size

      4.4MB

    • MD5

      c5e25683bad6530516b83b00c6332788

    • SHA1

      4cb7f56d9332b8d3dd2bbe65b231f27d52598620

    • SHA256

      f065d31c557335cad992a806aad8adb893ee2b35de8ab3b206290006991f354f

    • SHA512

      440c4191797704bae1609092631dd5dfdefd71c84281facd921cd6b19cbc1e52c781b2c0864d08871558e9788cdec0b38bcd1d701aa0432a9360e52eff775646

    • SSDEEP

      98304:aUTa4GtDOPFiDyqc1RxZ3mYmZix9nSz8cQGDtE6pQacW8KPOXxK:H2DOPFiDyqc1UiS8mLpaoOXxK

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Looks for VirtualBox Guest Additions in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

3
T1082

Tasks