Resubmissions

16-08-2021 11:47

210816-rdppjts4ax 9

09-07-2021 17:22

210709-kqt43n2hz6 10

09-07-2021 17:14

210709-h55grz443x 9

General

  • Target

    Vape V4.exe

  • Size

    42KB

  • Sample

    210709-kqt43n2hz6

  • MD5

    919b60c62ed64aa128f5a73f4c1a4b4f

  • SHA1

    23178189e308ca9e814caa2cad4ddf472e726b3f

  • SHA256

    050e1b254473b7bbb2214fe09aa93f2dc01793331106edb7f03fc834ca0a6b17

  • SHA512

    37941898baa7353e63b0934d80a931746bdfe5219e2972eec6dc6c05057ec420489331cf8313be21df69bb8e0f3f8a58279c27d458d241ba225e169e027d0817

Malware Config

Targets

    • Target

      Vape V4.exe

    • Size

      42KB

    • MD5

      919b60c62ed64aa128f5a73f4c1a4b4f

    • SHA1

      23178189e308ca9e814caa2cad4ddf472e726b3f

    • SHA256

      050e1b254473b7bbb2214fe09aa93f2dc01793331106edb7f03fc834ca0a6b17

    • SHA512

      37941898baa7353e63b0934d80a931746bdfe5219e2972eec6dc6c05057ec420489331cf8313be21df69bb8e0f3f8a58279c27d458d241ba225e169e027d0817

    Score
    9/10
    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

Query Registry

6
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

4
T1082

Peripheral Device Discovery

2
T1120

Tasks