General

  • Target

    2f56038a57495ab5608e1c67f7dbd688.bin

  • Size

    8.7MB

  • Sample

    210115-gdzwq89wha

  • MD5

    2f56038a57495ab5608e1c67f7dbd688

  • SHA1

    4da970efac6083ea26971c319671bcc2d6efd71a

  • SHA256

    6acd081ddf2683294dc75bb6eecd6bad5480d822b425043f245daab1970a93d0

  • SHA512

    12f1774ce6371fe1bcbee92107c46823694416e98068083e4d38c5a3381a4ca07b6d0895c6c09fb1c590fc20d9ed1e9928cedb6e0608a91c3addb4c9eee7520a

Malware Config

Targets

    • Target

      2f56038a57495ab5608e1c67f7dbd688.bin

    • Size

      8.7MB

    • MD5

      2f56038a57495ab5608e1c67f7dbd688

    • SHA1

      4da970efac6083ea26971c319671bcc2d6efd71a

    • SHA256

      6acd081ddf2683294dc75bb6eecd6bad5480d822b425043f245daab1970a93d0

    • SHA512

      12f1774ce6371fe1bcbee92107c46823694416e98068083e4d38c5a3381a4ca07b6d0895c6c09fb1c590fc20d9ed1e9928cedb6e0608a91c3addb4c9eee7520a

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks