General

  • Target

    67a7badc8a82d88c689aab0e34cf38aa731436ade886d44efefea4980184df6e

  • Size

    3.0MB

  • Sample

    210508-hhv1xrs6d2

  • MD5

    5e8d5a3daf118c9b4f9b1db43d3fecc1

  • SHA1

    17550761d49954ea76232ba16956afa84bf7112c

  • SHA256

    67a7badc8a82d88c689aab0e34cf38aa731436ade886d44efefea4980184df6e

  • SHA512

    1d1238d7febfe71f697fd8555dfae4b33f1e15f8e449c9dc0b74faa9f50d5a5c2d56a68de6fcde9867cfc149a75c02f5ec002471943f916b9fbb332145abeead

Malware Config

Targets

    • Target

      67a7badc8a82d88c689aab0e34cf38aa731436ade886d44efefea4980184df6e

    • Size

      3.0MB

    • MD5

      5e8d5a3daf118c9b4f9b1db43d3fecc1

    • SHA1

      17550761d49954ea76232ba16956afa84bf7112c

    • SHA256

      67a7badc8a82d88c689aab0e34cf38aa731436ade886d44efefea4980184df6e

    • SHA512

      1d1238d7febfe71f697fd8555dfae4b33f1e15f8e449c9dc0b74faa9f50d5a5c2d56a68de6fcde9867cfc149a75c02f5ec002471943f916b9fbb332145abeead

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks