General

  • Target

    vax loader_protected.exe

  • Size

    2.8MB

  • Sample

    240822-pgalysyhpr

  • MD5

    78acdef46270d9b357032e0050752c50

  • SHA1

    d5ae2895b3855b634406a2afc8ddda83c2b2fec6

  • SHA256

    b89ca81fe6a92e47a8587732ba500132345d187972d825ca70d18191cb61f36a

  • SHA512

    48fa74be027f95f40d74fc94e8d62b39ed12ec3403b5e6c0782a40c5a737f42da3ede4ef9e168bc6fcc842e11c1c31bea5d43a12d991aab346a559b06e83a8ca

  • SSDEEP

    49152:U5jjZUvK1KnoWpI7I1oE/KsOAC12pgeClroU9M+9kN4k8JDj8R4Q1cUWS:UjZU2x+R/I2qtNoU9M9N4FJDjMZ6w

Malware Config

Targets

    • Target

      vax loader_protected.exe

    • Size

      2.8MB

    • MD5

      78acdef46270d9b357032e0050752c50

    • SHA1

      d5ae2895b3855b634406a2afc8ddda83c2b2fec6

    • SHA256

      b89ca81fe6a92e47a8587732ba500132345d187972d825ca70d18191cb61f36a

    • SHA512

      48fa74be027f95f40d74fc94e8d62b39ed12ec3403b5e6c0782a40c5a737f42da3ede4ef9e168bc6fcc842e11c1c31bea5d43a12d991aab346a559b06e83a8ca

    • SSDEEP

      49152:U5jjZUvK1KnoWpI7I1oE/KsOAC12pgeClroU9M+9kN4k8JDj8R4Q1cUWS:UjZU2x+R/I2qtNoU9M9N4FJDjMZ6w

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks