General

  • Target

    2513c166dfbd432ad1a980c36238023dbce52d0cde365d3f4b1958e9f79406a2

  • Size

    2.3MB

  • Sample

    240701-dc7kcatfpc

  • MD5

    530854220a03249ca6131562a575e2c8

  • SHA1

    0da5d54b4d91ddeac41805427304875c27710d2e

  • SHA256

    2513c166dfbd432ad1a980c36238023dbce52d0cde365d3f4b1958e9f79406a2

  • SHA512

    0c989e9c762526c0341c6a8fa468e853432be5df0b84a90b086170325b2b3d4649e48773162877fe1d123f0bb082e0bd72cafefab884d9c41bc3fa589a7793ad

  • SSDEEP

    49152:6qKYG+jerYjOTAU4zmlC5nIBFpt78AzA/O1u9tnzLvXPUEuM:xPj4/TAUUmQ9IBFH72O0/LcS

Score
9/10

Malware Config

Targets

    • Target

      2513c166dfbd432ad1a980c36238023dbce52d0cde365d3f4b1958e9f79406a2

    • Size

      2.3MB

    • MD5

      530854220a03249ca6131562a575e2c8

    • SHA1

      0da5d54b4d91ddeac41805427304875c27710d2e

    • SHA256

      2513c166dfbd432ad1a980c36238023dbce52d0cde365d3f4b1958e9f79406a2

    • SHA512

      0c989e9c762526c0341c6a8fa468e853432be5df0b84a90b086170325b2b3d4649e48773162877fe1d123f0bb082e0bd72cafefab884d9c41bc3fa589a7793ad

    • SSDEEP

      49152:6qKYG+jerYjOTAU4zmlC5nIBFpt78AzA/O1u9tnzLvXPUEuM:xPj4/TAUUmQ9IBFH72O0/LcS

    Score
    9/10
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

5
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

4
T1082

Tasks