General

  • Target

    07bd641c847dbb5dc6ad97996050fa2b81d18d6e7f3ba96415f9e762d5cf10cb

  • Size

    8.1MB

  • Sample

    240420-g3x1dabb7x

  • MD5

    c2512a3b7d3c2e7374b66a6eaa6378c6

  • SHA1

    99303ebec1c79592a4956da910fb8548d7149aba

  • SHA256

    07bd641c847dbb5dc6ad97996050fa2b81d18d6e7f3ba96415f9e762d5cf10cb

  • SHA512

    ff570cf638b23220b63cf817f4f3090e6627c11fca6647a695ae7b122af3abd8eb8d96f749865f31f005d6e7f5dbb89b13a29ca54563fda9b968f2bd93e9f329

  • SSDEEP

    196608:KEXTvqJIEnM+YCx9ntwjZLCVWozNXC3geXN:LXTyJxM+YCDtjVd5CrX

Score
9/10

Malware Config

Targets

    • Target

      07bd641c847dbb5dc6ad97996050fa2b81d18d6e7f3ba96415f9e762d5cf10cb

    • Size

      8.1MB

    • MD5

      c2512a3b7d3c2e7374b66a6eaa6378c6

    • SHA1

      99303ebec1c79592a4956da910fb8548d7149aba

    • SHA256

      07bd641c847dbb5dc6ad97996050fa2b81d18d6e7f3ba96415f9e762d5cf10cb

    • SHA512

      ff570cf638b23220b63cf817f4f3090e6627c11fca6647a695ae7b122af3abd8eb8d96f749865f31f005d6e7f5dbb89b13a29ca54563fda9b968f2bd93e9f329

    • SSDEEP

      196608:KEXTvqJIEnM+YCx9ntwjZLCVWozNXC3geXN:LXTyJxM+YCDtjVd5CrX

    Score
    9/10
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

3
T1082

Tasks