General

  • Target

    vruns.exe

  • Size

    2.1MB

  • Sample

    210116-n3wg4yz6v6

  • MD5

    1490ea3019282b9fd5825bfd6f73b1cf

  • SHA1

    fa2c9a028db4dd83fa80fef8c90ca2bf34dc881d

  • SHA256

    8f01777956479851c4c5dd06845ba0d4561b2a085472460447d10b46d4b89487

  • SHA512

    bdf82235c3a3b94360c4e2507c6adb07d1731fff16b9d9038f9faed34ee55d60b70d9ca24a2f2baba7fcd4c95716d52590ed62a7802c068a8ae35d5213dfaced

Malware Config

Targets

    • Target

      vruns.exe

    • Size

      2.1MB

    • MD5

      1490ea3019282b9fd5825bfd6f73b1cf

    • SHA1

      fa2c9a028db4dd83fa80fef8c90ca2bf34dc881d

    • SHA256

      8f01777956479851c4c5dd06845ba0d4561b2a085472460447d10b46d4b89487

    • SHA512

      bdf82235c3a3b94360c4e2507c6adb07d1731fff16b9d9038f9faed34ee55d60b70d9ca24a2f2baba7fcd4c95716d52590ed62a7802c068a8ae35d5213dfaced

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

5
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

3
T1082

Collection

Data from Local System

2
T1005

Tasks