General

  • Target

    1d8dc3e252c5faab50f8eaf2c9eeffb3739cc5d99bec193603ed6aaa5f658bb7

  • Size

    4.1MB

  • Sample

    240523-ywdftsee41

  • MD5

    70afd758123536dc0f71a2889b787a3e

  • SHA1

    65e6c4e7453d907579ad44c706329e42f2d63922

  • SHA256

    1d8dc3e252c5faab50f8eaf2c9eeffb3739cc5d99bec193603ed6aaa5f658bb7

  • SHA512

    b11ace06c4a6c37eb32bff974f5f3315f7c91d1a26057428126f5b6c29771c27f21d4162b777c6a99f3afea3b2410e52f60964077d9f0ee71271804006419908

  • SSDEEP

    98304:ksVhFUPxSh+6Bl1r0Y+rxlEtgcajFv1hoKboRhVugu3Ag:k6oPxSE690NlUgcahv1OKbo8D

Malware Config

Targets

    • Target

      1d8dc3e252c5faab50f8eaf2c9eeffb3739cc5d99bec193603ed6aaa5f658bb7

    • Size

      4.1MB

    • MD5

      70afd758123536dc0f71a2889b787a3e

    • SHA1

      65e6c4e7453d907579ad44c706329e42f2d63922

    • SHA256

      1d8dc3e252c5faab50f8eaf2c9eeffb3739cc5d99bec193603ed6aaa5f658bb7

    • SHA512

      b11ace06c4a6c37eb32bff974f5f3315f7c91d1a26057428126f5b6c29771c27f21d4162b777c6a99f3afea3b2410e52f60964077d9f0ee71271804006419908

    • SSDEEP

      98304:ksVhFUPxSh+6Bl1r0Y+rxlEtgcajFv1hoKboRhVugu3Ag:k6oPxSE690NlUgcahv1OKbo8D

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks