General
-
Target
650f2409b85f546ee7345a8281edddd2b084152df6bb45778c958b31ab14d84b
-
Size
578KB
-
Sample
220119-skrlesbaa9
-
MD5
dfbf1c3345fa6eecbc7625e48745bb5d
-
SHA1
4052413e09323f822f5e4dcbd8a82ca376d6e26f
-
SHA256
650f2409b85f546ee7345a8281edddd2b084152df6bb45778c958b31ab14d84b
-
SHA512
269c4ed1dd5b2cfe93eaab0b0173762a1351630af91938f54f6da852a8feca1a51127e0ab57ca06d4fd36e2847595a47ebf6336f21e12b239bbaf65453676364
Static task
static1
Malware Config
Targets
-
-
Target
650f2409b85f546ee7345a8281edddd2b084152df6bb45778c958b31ab14d84b
-
Size
578KB
-
MD5
dfbf1c3345fa6eecbc7625e48745bb5d
-
SHA1
4052413e09323f822f5e4dcbd8a82ca376d6e26f
-
SHA256
650f2409b85f546ee7345a8281edddd2b084152df6bb45778c958b31ab14d84b
-
SHA512
269c4ed1dd5b2cfe93eaab0b0173762a1351630af91938f54f6da852a8feca1a51127e0ab57ca06d4fd36e2847595a47ebf6336f21e12b239bbaf65453676364
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix
Collection
Data from Local System
2Command and Control
Credential Access
Credentials in Files
2Defense Evasion
Disabling Security Tools
1Modify Registry
2Virtualization/Sandbox Evasion
1Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Privilege Escalation