General

  • Target

    Loader.exe

  • Size

    7.8MB

  • Sample

    240630-pjjbwaxfpb

  • MD5

    7a960cd7fcf3c530389ed176c5f4bc67

  • SHA1

    60e8a9b976097da9e3c6b6bd6a2710cf0092cf39

  • SHA256

    7523198ff0e6c82a4e8cdd35e0f2773e9972e23b4507ca408821b5a8775fc93a

  • SHA512

    98c628a5c47f5ca1b06a3bb0bc9b0bef1d4afe3f7d3d4e589abb56f04577de45559f4a60555388e93037eecf5d66717fdc40a3095b3eaff05fe8c01f8a87ad1a

  • SSDEEP

    196608:75uIxb2qFQOQNzHNh/xYmolV6ehwsDC5kkkecj:75uCKqF9QNzHNUXVLhnCek3cj

Malware Config

Targets

    • Target

      Loader.exe

    • Size

      7.8MB

    • MD5

      7a960cd7fcf3c530389ed176c5f4bc67

    • SHA1

      60e8a9b976097da9e3c6b6bd6a2710cf0092cf39

    • SHA256

      7523198ff0e6c82a4e8cdd35e0f2773e9972e23b4507ca408821b5a8775fc93a

    • SHA512

      98c628a5c47f5ca1b06a3bb0bc9b0bef1d4afe3f7d3d4e589abb56f04577de45559f4a60555388e93037eecf5d66717fdc40a3095b3eaff05fe8c01f8a87ad1a

    • SSDEEP

      196608:75uIxb2qFQOQNzHNh/xYmolV6ehwsDC5kkkecj:75uCKqF9QNzHNUXVLhnCek3cj

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks