General

  • Target

    36f9a4f21bafa4ade632e47d1f72d31eb0b41d647549f6f455c1ccca9242cde2

  • Size

    2.8MB

  • Sample

    220213-l5wmjsafdp

  • MD5

    805b3ae4a0c89285f89c4bc51a5f6228

  • SHA1

    269615cb21b20e743ea8a2eb2db85d613f5a6f3c

  • SHA256

    36f9a4f21bafa4ade632e47d1f72d31eb0b41d647549f6f455c1ccca9242cde2

  • SHA512

    27b4fc348885283259f96319475620a0b3bfd879f4d52f2b6eed3ff91e392857ec1846cc6287de8642d8fe70e52ad220483b7b45485dd702a46519cbde2f1188

Malware Config

Targets

    • Target

      36f9a4f21bafa4ade632e47d1f72d31eb0b41d647549f6f455c1ccca9242cde2

    • Size

      2.8MB

    • MD5

      805b3ae4a0c89285f89c4bc51a5f6228

    • SHA1

      269615cb21b20e743ea8a2eb2db85d613f5a6f3c

    • SHA256

      36f9a4f21bafa4ade632e47d1f72d31eb0b41d647549f6f455c1ccca9242cde2

    • SHA512

      27b4fc348885283259f96319475620a0b3bfd879f4d52f2b6eed3ff91e392857ec1846cc6287de8642d8fe70e52ad220483b7b45485dd702a46519cbde2f1188

    • suricata: ET MALWARE Observed Win32/CollectorStealer User-Agent M2

      suricata: ET MALWARE Observed Win32/CollectorStealer User-Agent M2

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks