General

  • Target

    Veax Free.rar

  • Size

    3.8MB

  • Sample

    240630-slzy7azcpc

  • MD5

    5c060ff89254355b12b5b097b4114c12

  • SHA1

    4e155b40358435464fb041dd37fb5bcfaf630387

  • SHA256

    838ca1cdcb23140679f6bf04273976d9e736a7cb0ef23adccba727f741585fe7

  • SHA512

    dcdd23d8693456e5391633705afe431309cec0e643d20fcf0cfac18180532a4185857fcdf3e0ff4bbe47f8952700d34de5eaa53261d5a90c1ae8ba39a9e84c23

  • SSDEEP

    98304:NKhQYVcpyAozHkpDl3/r9kCGq5eNh8UgxvPFWPADa7sf3/76VNPfU31lr:NWQm87R3ZFGtkgCV/SHUrr

Malware Config

Targets

    • Target

      Veax Free/serial.bat

    • Size

      496B

    • MD5

      7a5d295e468a75dd7272c7642b1a269f

    • SHA1

      efaf4e7994cb38ea78aceed95b00cac1918984d0

    • SHA256

      230e6a26c9feabb1d82f27845290942db22fbe2877faf05c093bc139edeeb7f0

    • SHA512

      f23b628243601e1c3a9014dd3c735188be6b669be1772d39acbdb9f63486ceb2b374989f7e39bf8d04391d6f977d0e064ac79b263a0ff4e76a775e323f052b64

    Score
    1/10
    • Target

      Veax Free/veax_protected.exe

    • Size

      3.8MB

    • MD5

      386428b81e1a52e63f688e9ed323d066

    • SHA1

      bd94ce6bd113d2f1b69af81244b268fda9d99160

    • SHA256

      91bd58996da4433a6ce296547bea69861478b653117315831bfd825b2e4e0d3a

    • SHA512

      d5b0d98a981f7ee2571ed2b4ed3932c71c0629676e9bbb7e3e457a347f029f1abe43b951c7e9430f0afc9f06bc886f28b198a828a837a2fd98fe5758ae35f15a

    • SSDEEP

      49152:tI7WUD3/Bu/mJiKNUyGy8lPO3dpFwvq8zZ9TMit9nXIALJ95Z+0dVgBreCdz3xo2:tuvJiAGytb8Xpt9ICJ95BdVgJ1CH7Glj

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks