General

  • Target

    6_ico.exe

  • Size

    1.8MB

  • Sample

    210226-4s5d43lvbx

  • MD5

    f9cbb8637e9c0a5bc3ed7800a364285c

  • SHA1

    2e990ec1fdee46b2f8aa6323f428b5b1403f451a

  • SHA256

    ccf0e52e21388ebfab406f10061864daf9bca0232a7eb09f1cd5b2a036853dbe

  • SHA512

    dc8233afac50dfda009108482b57548d0c5d00462c951745cb44e421c03967bb3c7cae26a464592a7a88f7100fd838b4e2e5c6999395153863c63a4cfa3ce812

Score
9/10

Malware Config

Targets

    • Target

      6_ico.exe

    • Size

      1.8MB

    • MD5

      f9cbb8637e9c0a5bc3ed7800a364285c

    • SHA1

      2e990ec1fdee46b2f8aa6323f428b5b1403f451a

    • SHA256

      ccf0e52e21388ebfab406f10061864daf9bca0232a7eb09f1cd5b2a036853dbe

    • SHA512

      dc8233afac50dfda009108482b57548d0c5d00462c951745cb44e421c03967bb3c7cae26a464592a7a88f7100fd838b4e2e5c6999395153863c63a4cfa3ce812

    Score
    9/10
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks