General

  • Target

    usfive_20210718-054407

  • Size

    499KB

  • Sample

    210718-y95bqp51hs

  • MD5

    c7500b36c6478a2d5162e5e2a724f6b9

  • SHA1

    519bb06a73c409183e760cf34c736814766aa26b

  • SHA256

    51ea3dcb5378ab72e574655c231385a182feceec9d62b8e803b98e4b3499c3cb

  • SHA512

    731c190caf7595b5c35a0870439fc90a0aca1ee90c9aa7e079157f2cc881ba342ca542c9a7e8354721136b15b809a9789c161879a8d121a9ba38e017806da035

Malware Config

Targets

    • Target

      usfive_20210718-054407

    • Size

      499KB

    • MD5

      c7500b36c6478a2d5162e5e2a724f6b9

    • SHA1

      519bb06a73c409183e760cf34c736814766aa26b

    • SHA256

      51ea3dcb5378ab72e574655c231385a182feceec9d62b8e803b98e4b3499c3cb

    • SHA512

      731c190caf7595b5c35a0870439fc90a0aca1ee90c9aa7e079157f2cc881ba342ca542c9a7e8354721136b15b809a9789c161879a8d121a9ba38e017806da035

    • DarkVNC

      DarkVNC is a malicious version of the famous VNC software.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • DarkVNC Payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks