General

  • Target

    65041a83c88ba90e489de8ac275688815c51b93ae568c627b74fc160d2db6bab

  • Size

    9.2MB

  • Sample

    220124-fg6vqaccgk

  • MD5

    2b9ef4ae5ebd8429d6d84c894ecc8fab

  • SHA1

    eca4cebc30fcc93ee073185a7a6b2862c116fbd2

  • SHA256

    65041a83c88ba90e489de8ac275688815c51b93ae568c627b74fc160d2db6bab

  • SHA512

    43f378cb70537a0cc30458a7044fb9cfa0debbfe43cdaeee96f4fc3d829370119fa0703460fff49c952fe0d7edc61033e57e0b2b5fdefeb13b4b643ff80355f0

Malware Config

Targets

    • Target

      65041a83c88ba90e489de8ac275688815c51b93ae568c627b74fc160d2db6bab

    • Size

      9.2MB

    • MD5

      2b9ef4ae5ebd8429d6d84c894ecc8fab

    • SHA1

      eca4cebc30fcc93ee073185a7a6b2862c116fbd2

    • SHA256

      65041a83c88ba90e489de8ac275688815c51b93ae568c627b74fc160d2db6bab

    • SHA512

      43f378cb70537a0cc30458a7044fb9cfa0debbfe43cdaeee96f4fc3d829370119fa0703460fff49c952fe0d7edc61033e57e0b2b5fdefeb13b4b643ff80355f0

    • StrongPity

      StrongPity is a spyware developed by PROMETHIUM APT group mainly used in government sponsored attacks.

    • StrongPity Spyware

    • suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)

      suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

3
T1082

Command and Control

Web Service

1
T1102

Tasks