General

  • Target

    b02dcfc796c6c7bb6b8a685c1caf5f05

  • Size

    2.8MB

  • Sample

    211020-qhah1shah7

  • MD5

    b02dcfc796c6c7bb6b8a685c1caf5f05

  • SHA1

    497a37d73c784984ab491c2ca8a7842ca54bfca0

  • SHA256

    f96d569b07088f8b53df94b43059d301ef7bc743e48951430f8ee2dc17c0bc54

  • SHA512

    5d5639855fe450a6ed09e30513bb70049e931e4e0f766b678e699b83da5b1ca6b6acebe32f47a97372081baba0c5b0a2a7f79434e23730d4d7ed5cbd9e117670

Malware Config

Targets

    • Target

      b02dcfc796c6c7bb6b8a685c1caf5f05

    • Size

      2.8MB

    • MD5

      b02dcfc796c6c7bb6b8a685c1caf5f05

    • SHA1

      497a37d73c784984ab491c2ca8a7842ca54bfca0

    • SHA256

      f96d569b07088f8b53df94b43059d301ef7bc743e48951430f8ee2dc17c0bc54

    • SHA512

      5d5639855fe450a6ed09e30513bb70049e931e4e0f766b678e699b83da5b1ca6b6acebe32f47a97372081baba0c5b0a2a7f79434e23730d4d7ed5cbd9e117670

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks