Resubmissions

17-01-2021 16:59

210117-6ey58f9a6n 10

17-01-2021 13:48

210117-n7tc3vn22s 10

General

  • Target

    monthly financial statement.doc

  • Size

    1.7MB

  • Sample

    210117-n7tc3vn22s

  • MD5

    0675edf4c9212b83a850c75398f648e8

  • SHA1

    d041f7d11a1da3a6d2db81cb84cce61c2c4e1281

  • SHA256

    5f94fc16fc1729c7817f052cd6aaf7d1638aba942ef380b35a0003ec1f146439

  • SHA512

    2cae441769260bdfca0a5a1ae6828e98281cfac3dc8c3e380e5390bd13a49251f1d224c00c0364cf649324364900fab9480edf946f221004c29fac9529d4b992

Malware Config

Targets

    • Target

      monthly financial statement.doc

    • Size

      1.7MB

    • MD5

      0675edf4c9212b83a850c75398f648e8

    • SHA1

      d041f7d11a1da3a6d2db81cb84cce61c2c4e1281

    • SHA256

      5f94fc16fc1729c7817f052cd6aaf7d1638aba942ef380b35a0003ec1f146439

    • SHA512

      2cae441769260bdfca0a5a1ae6828e98281cfac3dc8c3e380e5390bd13a49251f1d224c00c0364cf649324364900fab9480edf946f221004c29fac9529d4b992

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • JavaScript code in executable

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

4
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

4
T1005

Command and Control

Web Service

1
T1102

Tasks