Resubmissions

30-03-2023 19:52

230330-ylrkpsfe3v 9

30-03-2023 19:42

230330-yezyhafd9v 9

General

  • Target

    B4495E11AACF8D20A0161000749817DB.exe

  • Size

    3.1MB

  • Sample

    230330-yezyhafd9v

  • MD5

    b4495e11aacf8d20a0161000749817db

  • SHA1

    02a504731b41172614ee8790a287bc99f7800540

  • SHA256

    86e72cc0456f4f34626f6e37c8b17e4ba7b6d98dbf777d4cebfc379d9ae6a4b2

  • SHA512

    f08c4b2df291ba19671c58b8072b0ac2d392569c7ad5e676857fe7f622dd8984850ba664fe5b936197f894da83408786f4f5f4abf383b66ff9fa5970db40180c

  • SSDEEP

    49152:ki/BUmEi8As05+KXwz5ZOcjJW75nRMhk3Ujj852v2GyfM+SINfvVKm0xm+8VYf:kiZ18AsrcwbSMhXYzGyuINUg+8Vk

Malware Config

Targets

    • Target

      B4495E11AACF8D20A0161000749817DB.exe

    • Size

      3.1MB

    • MD5

      b4495e11aacf8d20a0161000749817db

    • SHA1

      02a504731b41172614ee8790a287bc99f7800540

    • SHA256

      86e72cc0456f4f34626f6e37c8b17e4ba7b6d98dbf777d4cebfc379d9ae6a4b2

    • SHA512

      f08c4b2df291ba19671c58b8072b0ac2d392569c7ad5e676857fe7f622dd8984850ba664fe5b936197f894da83408786f4f5f4abf383b66ff9fa5970db40180c

    • SSDEEP

      49152:ki/BUmEi8As05+KXwz5ZOcjJW75nRMhk3Ujj852v2GyfM+SINfvVKm0xm+8VYf:kiZ18AsrcwbSMhXYzGyuINUg+8Vk

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks