General

  • Target

    392a3fa738bc94c489cffb1041f79efa329c591f5f51433df6a9655fe46b1120

  • Size

    1.7MB

  • Sample

    211130-tmkrbsafc3

  • MD5

    f5d6bea53461a316ec90a33da7e2ad50

  • SHA1

    4a66c84431c6c77dae23e270b51e6fa2ce04734f

  • SHA256

    392a3fa738bc94c489cffb1041f79efa329c591f5f51433df6a9655fe46b1120

  • SHA512

    e66c867a4655fb9b1e3c936bcd5d5b5246c8049bd7c693b6a62b4f67c7cbfc56601c5f8d6c459838fd8979ffaf8e9caeae110d2e8f898ca4a5db1df4a90e850f

Malware Config

Targets

    • Target

      392a3fa738bc94c489cffb1041f79efa329c591f5f51433df6a9655fe46b1120

    • Size

      1.7MB

    • MD5

      f5d6bea53461a316ec90a33da7e2ad50

    • SHA1

      4a66c84431c6c77dae23e270b51e6fa2ce04734f

    • SHA256

      392a3fa738bc94c489cffb1041f79efa329c591f5f51433df6a9655fe46b1120

    • SHA512

      e66c867a4655fb9b1e3c936bcd5d5b5246c8049bd7c693b6a62b4f67c7cbfc56601c5f8d6c459838fd8979ffaf8e9caeae110d2e8f898ca4a5db1df4a90e850f

    • Looks for VirtualBox Guest Additions in registry

    • Executes dropped EXE

    • Looks for VMWare Tools registry key

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks