General

  • Target

    68b42783b0d254c71ac08d3df857c387571dba931b8c0e5cc85a5155927617fa

  • Size

    5.0MB

  • Sample

    240523-yhcx5sdh6z

  • MD5

    c9e9d8d12797b452d0e786ac5f142aab

  • SHA1

    e63dfc85ca25332064ccf549dca07aee5629006d

  • SHA256

    68b42783b0d254c71ac08d3df857c387571dba931b8c0e5cc85a5155927617fa

  • SHA512

    1c8a8ffa15c07c3de32cbe1d8f0de7055aa8b2d00b3e1af493feeedaf1e692527d0d92e3feb13d94e03b2e9a97e5927ebf26d8f75cd098487e7c1a9d6635dfc2

  • SSDEEP

    98304:5U4kkzOlmCyYrFwiraTjFJQMMp9URCIDBml9EflH20kqGb9as:5U4kk6W5imT/Q/rURXTkqcas

Malware Config

Targets

    • Target

      68b42783b0d254c71ac08d3df857c387571dba931b8c0e5cc85a5155927617fa

    • Size

      5.0MB

    • MD5

      c9e9d8d12797b452d0e786ac5f142aab

    • SHA1

      e63dfc85ca25332064ccf549dca07aee5629006d

    • SHA256

      68b42783b0d254c71ac08d3df857c387571dba931b8c0e5cc85a5155927617fa

    • SHA512

      1c8a8ffa15c07c3de32cbe1d8f0de7055aa8b2d00b3e1af493feeedaf1e692527d0d92e3feb13d94e03b2e9a97e5927ebf26d8f75cd098487e7c1a9d6635dfc2

    • SSDEEP

      98304:5U4kkzOlmCyYrFwiraTjFJQMMp9URCIDBml9EflH20kqGb9as:5U4kk6W5imT/Q/rURXTkqcas

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks