General

  • Target

    loader.exe

  • Size

    9.6MB

  • Sample

    230328-vy7kxacb94

  • MD5

    b1ffa9811710623f9f0a37494f288447

  • SHA1

    c5fe7aed02d70b5ef9c30b5c4520de2c81b8c655

  • SHA256

    b8844878c0df4f7d1f9362a4339c2af509e0f49f0b5dcbf6b8c3522b9c9023b7

  • SHA512

    27ae660a146c974cd03e66410e3e632cc3a69d0952ac50d658b535c8d98e53d09207f5933cb787e25fdb3ead5a025dc90c147d1e9928678ef96aec04e4bf4fc2

  • SSDEEP

    196608:ZM2op6SSs4RwVB2T8cwOpmUIvmCDhC2G7WY4EbiClLe6kjp2iWqG4WGn8b4u9sYf:ZM2op6SSs4RwVB2T8cwOpmUIvmCDhC2q

Malware Config

Targets

    • Target

      loader.exe

    • Size

      9.6MB

    • MD5

      b1ffa9811710623f9f0a37494f288447

    • SHA1

      c5fe7aed02d70b5ef9c30b5c4520de2c81b8c655

    • SHA256

      b8844878c0df4f7d1f9362a4339c2af509e0f49f0b5dcbf6b8c3522b9c9023b7

    • SHA512

      27ae660a146c974cd03e66410e3e632cc3a69d0952ac50d658b535c8d98e53d09207f5933cb787e25fdb3ead5a025dc90c147d1e9928678ef96aec04e4bf4fc2

    • SSDEEP

      196608:ZM2op6SSs4RwVB2T8cwOpmUIvmCDhC2G7WY4EbiClLe6kjp2iWqG4WGn8b4u9sYf:ZM2op6SSs4RwVB2T8cwOpmUIvmCDhC2q

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks