General

  • Target

    vpn_ico.exe

  • Size

    1.7MB

  • Sample

    210114-b49t9bhe2e

  • MD5

    c0ffcf0a3850f75b4e080e282d83950e

  • SHA1

    26ecc7690de6767626202b0036992b4fc3826ed8

  • SHA256

    b4725df9c9daeee5ec97533ff63a7629e45ad047ee43befb8d3d76ba2c0c21ca

  • SHA512

    ecb8f0862790520caa3445f667ca2a40b11d02a63b94aca9d8c4bee11b2435e554cb580ca71e0ebda9c5edd19ad6c6d28b96d5fa41b11a1ccc7a82df035a1f2b

Malware Config

Targets

    • Target

      vpn_ico.exe

    • Size

      1.7MB

    • MD5

      c0ffcf0a3850f75b4e080e282d83950e

    • SHA1

      26ecc7690de6767626202b0036992b4fc3826ed8

    • SHA256

      b4725df9c9daeee5ec97533ff63a7629e45ad047ee43befb8d3d76ba2c0c21ca

    • SHA512

      ecb8f0862790520caa3445f667ca2a40b11d02a63b94aca9d8c4bee11b2435e554cb580ca71e0ebda9c5edd19ad6c6d28b96d5fa41b11a1ccc7a82df035a1f2b

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks