General

  • Target

    TeamViewer.exe

  • Size

    16.0MB

  • Sample

    210724-xcs35te41s

  • MD5

    1f71c8a0701f69e49a13cc1412ba62e1

  • SHA1

    c030d488cdfcc966bb5008798db7f97301ff6a7d

  • SHA256

    f760a707611b83ffc47b26249577f80894336ad46a9b463011036cb7d1f7b982

  • SHA512

    cdc76accbfb057a2d31b1d18a8f65634fa3985e99a4e4367b06d0b19e6a251b26563dfeedac435c62c15b35af61c60e3587a1eb8fa130371ffd3efc1dfb33449

Score
10/10

Malware Config

Targets

    • Target

      TeamViewer.exe

    • Size

      16.0MB

    • MD5

      1f71c8a0701f69e49a13cc1412ba62e1

    • SHA1

      c030d488cdfcc966bb5008798db7f97301ff6a7d

    • SHA256

      f760a707611b83ffc47b26249577f80894336ad46a9b463011036cb7d1f7b982

    • SHA512

      cdc76accbfb057a2d31b1d18a8f65634fa3985e99a4e4367b06d0b19e6a251b26563dfeedac435c62c15b35af61c60e3587a1eb8fa130371ffd3efc1dfb33449

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Collection

Data from Local System

1
T1005

Tasks