General

  • Target

    Far Cry 6.exe

  • Size

    5.9MB

  • Sample

    211023-3xahsacee8

  • MD5

    0e7ee1cd8dd93cd7937b425d2af5d081

  • SHA1

    123a219c31bc9cbc518e214be29b9f59279984c3

  • SHA256

    e87d665a4fbec30fcb5bd5d5203c4736810d638e9b82fb06257ae8a4087cbc17

  • SHA512

    2ac151702dc36e8dd95fc4c754d3febb89dea579a9f3947f388079859c90d4434558a545a82edb30cca0108c94154732a28eca0e3183064d556857d3cd6f5264

Malware Config

Targets

    • Target

      Far Cry 6.exe

    • Size

      5.9MB

    • MD5

      0e7ee1cd8dd93cd7937b425d2af5d081

    • SHA1

      123a219c31bc9cbc518e214be29b9f59279984c3

    • SHA256

      e87d665a4fbec30fcb5bd5d5203c4736810d638e9b82fb06257ae8a4087cbc17

    • SHA512

      2ac151702dc36e8dd95fc4c754d3febb89dea579a9f3947f388079859c90d4434558a545a82edb30cca0108c94154732a28eca0e3183064d556857d3cd6f5264

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks