General
-
Target
Themida v3.1.8.0.zip
-
Size
61.8MB
-
Sample
240519-zjlgcahb6t
-
MD5
d2c3f03074805cf7ce4f909d308496aa
-
SHA1
095e84046c7d4c06d2614a6fc965f3ed1dc33c0b
-
SHA256
ae4d2c72d916bb5f3a8b8a5e58008f350e4b34d6dde37084d05ac592580a698d
-
SHA512
dbe3a63cfc0e45f21f9cc36274c301a208272f8986f5004b6a85eeeedbe73f1ab2deb350a38975f6a0bd6dd6ef23e892f4e614ab4861516da7d50895281f9034
-
SSDEEP
1572864:zwGCfYhHz4SM4Tplv5cJjJIb/iDlikLOnU4/jxn7EdaIP21V:kGCAZz4SMkpjwqsikSU4/j5YgIu1V
Static task
static1
Behavioral task
behavioral1
Sample
Themida v3.1.8.0.zip
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Themida v3.1.8.0.zip
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
Themida v3.1.8.0.zip
-
Size
61.8MB
-
MD5
d2c3f03074805cf7ce4f909d308496aa
-
SHA1
095e84046c7d4c06d2614a6fc965f3ed1dc33c0b
-
SHA256
ae4d2c72d916bb5f3a8b8a5e58008f350e4b34d6dde37084d05ac592580a698d
-
SHA512
dbe3a63cfc0e45f21f9cc36274c301a208272f8986f5004b6a85eeeedbe73f1ab2deb350a38975f6a0bd6dd6ef23e892f4e614ab4861516da7d50895281f9034
-
SSDEEP
1572864:zwGCfYhHz4SM4Tplv5cJjJIb/iDlikLOnU4/jxn7EdaIP21V:kGCAZz4SMkpjwqsikSU4/j5YgIu1V
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-