General

  • Target

    l6Bhr8u2qVyBAFJ8oma152l9Z.exe

  • Size

    2.9MB

  • Sample

    240425-z61jsafb48

  • MD5

    82cc62b29242dcaafe424400b12ee2fa

  • SHA1

    74b7940026ab1bbf99445958f9731ec63234dec1

  • SHA256

    ca22090738d5971eeefe09507f82e17f958eae1ffed175cc661cc0fbe65f7aee

  • SHA512

    08f0533a86e1d1b4f9402b3858a92a284a9e2b496096fc791de52bd9c5e6c2e5b00c808e67fb9c956923cee87ee5f8e9328039f8d79093f0872a71e9272cfaff

  • SSDEEP

    49152:VAGNasNJnazTkmLp/w/qKP1Wv/cNwDhWiZe1n1t5Kh5lYOw8a+8F4RLQjqBN:9Nx+EmV/wTPkHcNChWik1n4hk8aN4Yq3

Malware Config

Targets

    • Target

      l6Bhr8u2qVyBAFJ8oma152l9Z.exe

    • Size

      2.9MB

    • MD5

      82cc62b29242dcaafe424400b12ee2fa

    • SHA1

      74b7940026ab1bbf99445958f9731ec63234dec1

    • SHA256

      ca22090738d5971eeefe09507f82e17f958eae1ffed175cc661cc0fbe65f7aee

    • SHA512

      08f0533a86e1d1b4f9402b3858a92a284a9e2b496096fc791de52bd9c5e6c2e5b00c808e67fb9c956923cee87ee5f8e9328039f8d79093f0872a71e9272cfaff

    • SSDEEP

      49152:VAGNasNJnazTkmLp/w/qKP1Wv/cNwDhWiZe1n1t5Kh5lYOw8a+8F4RLQjqBN:9Nx+EmV/wTPkHcNChWik1n4hk8aN4Yq3

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks