General

  • Target

    9e559c854f7b4c66ffbe7702e8f49cd0.exe

  • Size

    154KB

  • Sample

    210909-h8f5gsfgc2

  • MD5

    9e559c854f7b4c66ffbe7702e8f49cd0

  • SHA1

    cd28198ef48a50b3d14dc8eb5d37f505b2c85c33

  • SHA256

    7004285faaa3caabec19f6382f86f380da6fbe1eb5d624a7bc2a9e999a5ba79d

  • SHA512

    c2c751b71a3b7a2bcade9d59b7071ee4af5f239be4fd2075fb2a4d6bfa23ca1edde4083f0a0aafb578bc1161e5ec5b34587f2596b20309d9541c35df67585e89

Malware Config

Targets

    • Target

      9e559c854f7b4c66ffbe7702e8f49cd0.exe

    • Size

      154KB

    • MD5

      9e559c854f7b4c66ffbe7702e8f49cd0

    • SHA1

      cd28198ef48a50b3d14dc8eb5d37f505b2c85c33

    • SHA256

      7004285faaa3caabec19f6382f86f380da6fbe1eb5d624a7bc2a9e999a5ba79d

    • SHA512

      c2c751b71a3b7a2bcade9d59b7071ee4af5f239be4fd2075fb2a4d6bfa23ca1edde4083f0a0aafb578bc1161e5ec5b34587f2596b20309d9541c35df67585e89

    • VKeylogger

      A keylogger first seen in Nov 2020.

    • VKeylogger Payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks