General

  • Target

    RFQ.exe

  • Size

    495KB

  • Sample

    200707-9w6w8f6952

  • MD5

    90bc233072e6861d2ec83c426326df29

  • SHA1

    3f1745aca4112de2d009b1d67b9dc2ab8ed52cab

  • SHA256

    331d01e29a84b4a0e86a89c23ee4d2223820121d286b1fe151b57c6e09a76240

  • SHA512

    f3c2db9fdfac5a46162dde1dfbe9240865eee27f87409e29baf152c04377a52f2fe2c949e2f7389ef4fbf1030456dcc6c65babe45e16109f3f378534b24beb24

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.ru
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    @jaffinmarknma@344

Targets

    • Target

      RFQ.exe

    • Size

      495KB

    • MD5

      90bc233072e6861d2ec83c426326df29

    • SHA1

      3f1745aca4112de2d009b1d67b9dc2ab8ed52cab

    • SHA256

      331d01e29a84b4a0e86a89c23ee4d2223820121d286b1fe151b57c6e09a76240

    • SHA512

      f3c2db9fdfac5a46162dde1dfbe9240865eee27f87409e29baf152c04377a52f2fe2c949e2f7389ef4fbf1030456dcc6c65babe45e16109f3f378534b24beb24

    Score
    10/10
    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks