General

  • Target

    ivm31_protected.exe

  • Size

    2.8MB

  • Sample

    210115-y91frvzg56

  • MD5

    2093bf0de6bc1a8763835f287b8784dc

  • SHA1

    a15bd81406d950f86120ae338125beb8e85923c4

  • SHA256

    0a429c131f5188ad77d4f453e5dbeca5f0e451c4dab3789fd2dce9467ba90b42

  • SHA512

    c86476e9c764921295eeed033217bf5e73cf508606b6f32968381da004828605dfb4c589abb712f46aa8b7648700bcdfa6699fdaf1d197c0d13ab68600213ed3

Malware Config

Targets

    • Target

      ivm31_protected.exe

    • Size

      2.8MB

    • MD5

      2093bf0de6bc1a8763835f287b8784dc

    • SHA1

      a15bd81406d950f86120ae338125beb8e85923c4

    • SHA256

      0a429c131f5188ad77d4f453e5dbeca5f0e451c4dab3789fd2dce9467ba90b42

    • SHA512

      c86476e9c764921295eeed033217bf5e73cf508606b6f32968381da004828605dfb4c589abb712f46aa8b7648700bcdfa6699fdaf1d197c0d13ab68600213ed3

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks