General

  • Target

    mixshop_20210925-070058

  • Size

    2.5MB

  • Sample

    210926-nzsptaegg2

  • MD5

    7792aea13d4fa9e4ccc48cc498d412e6

  • SHA1

    18bb7808be2b9d7786f351234be3e52cde484695

  • SHA256

    9c905874f8e8b97d9db5644d4d2f3a50a429a900a18ed795513c3ed59f15578e

  • SHA512

    3407bc9f26fcb3245e0abe217bb78a9b653ec235c413ae8c0d22c1e9222b73a9e50845e53bf0ae8146d7136679118c44a69e0e738d42d4cb8f2a190219abdd7d

Malware Config

Targets

    • Target

      mixshop_20210925-070058

    • Size

      2.5MB

    • MD5

      7792aea13d4fa9e4ccc48cc498d412e6

    • SHA1

      18bb7808be2b9d7786f351234be3e52cde484695

    • SHA256

      9c905874f8e8b97d9db5644d4d2f3a50a429a900a18ed795513c3ed59f15578e

    • SHA512

      3407bc9f26fcb3245e0abe217bb78a9b653ec235c413ae8c0d22c1e9222b73a9e50845e53bf0ae8146d7136679118c44a69e0e738d42d4cb8f2a190219abdd7d

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks