General

  • Target

    PO_Dubai45448578844.exe

  • Size

    545KB

  • Sample

    200709-b1d438t9aa

  • MD5

    0fc11f404166726547fb16f29f4961dc

  • SHA1

    9e8654a03e5d20fdb982eb2a3afbc78d819f97f3

  • SHA256

    1aeebb408f994fab29b26a81576cbd195faf9d4a1e0ef4c299e38b970e43de2c

  • SHA512

    abac6f4e9b28e9274e8657c92458159b874760c9b706d1e7337d4cfa8723f9bda02273b1c94edc2fefac2a6491fc841443c5184d7095d6bc697be0e47bbfe629

Score
9/10

Malware Config

Targets

    • Target

      PO_Dubai45448578844.exe

    • Size

      545KB

    • MD5

      0fc11f404166726547fb16f29f4961dc

    • SHA1

      9e8654a03e5d20fdb982eb2a3afbc78d819f97f3

    • SHA256

      1aeebb408f994fab29b26a81576cbd195faf9d4a1e0ef4c299e38b970e43de2c

    • SHA512

      abac6f4e9b28e9274e8657c92458159b874760c9b706d1e7337d4cfa8723f9bda02273b1c94edc2fefac2a6491fc841443c5184d7095d6bc697be0e47bbfe629

    Score
    9/10
    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks