General

  • Target

    LOAD FIVEM HACK.exe

  • Size

    19.1MB

  • Sample

    211203-wq3gnahbdn

  • MD5

    41cc3c19dac08d2c7365d897d396733e

  • SHA1

    7eb01e9812ce1cea266ad43c4dce589ec8495818

  • SHA256

    80cf0f9c2763be12d717c88bc1a22b94d93e5c9055fb8d6ce2e9fe58a2bd9e23

  • SHA512

    479bc22aae5c78007d6b4683ff2dfa5456685ae687b5a0b3ff1668b1baa1769c94495ed00ad44a6f9649fca4ec3f5a5e299600826dc331decd57e03ea08f0eb6

Malware Config

Targets

    • Target

      LOAD FIVEM HACK.exe

    • Size

      19.1MB

    • MD5

      41cc3c19dac08d2c7365d897d396733e

    • SHA1

      7eb01e9812ce1cea266ad43c4dce589ec8495818

    • SHA256

      80cf0f9c2763be12d717c88bc1a22b94d93e5c9055fb8d6ce2e9fe58a2bd9e23

    • SHA512

      479bc22aae5c78007d6b4683ff2dfa5456685ae687b5a0b3ff1668b1baa1769c94495ed00ad44a6f9649fca4ec3f5a5e299600826dc331decd57e03ea08f0eb6

    • Modifies Windows Defender Real-time Protection settings

    • Modifies security service

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops startup file

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

2
T1031

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

1
T1089

Virtualization/Sandbox Evasion

2
T1497

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks