General

  • Target

    bb940b97_extracted

  • Size

    2.0MB

  • Sample

    210216-6z5cnc1xtx

  • MD5

    aa42d84248af944b0947399f4d72267a

  • SHA1

    08815276a5efc5c49746fd9a10e6ed32069958d5

  • SHA256

    64bfbbdf08aebb66f89866457a931b330968c126c87e8b02f1324392e65a4606

  • SHA512

    864c958a0d4277c208dddcee66dc19604480043b213b457042015185e523b0e3219ff022a7df8ad935a16f6557dcb9ad8554092273f382181a6bac59fc90f0c9

Malware Config

Targets

    • Target

      bb940b97_extracted

    • Size

      2.0MB

    • MD5

      aa42d84248af944b0947399f4d72267a

    • SHA1

      08815276a5efc5c49746fd9a10e6ed32069958d5

    • SHA256

      64bfbbdf08aebb66f89866457a931b330968c126c87e8b02f1324392e65a4606

    • SHA512

      864c958a0d4277c208dddcee66dc19604480043b213b457042015185e523b0e3219ff022a7df8ad935a16f6557dcb9ad8554092273f382181a6bac59fc90f0c9

    • Parasite, Nexus

      Parasite (or Nexus) is an infostealer written in C++.

    • Executes dropped EXE

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Hidden Files and Directories

1
T1158

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Hidden Files and Directories

1
T1158

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks