General

  • Target

    Disbalancer.exe

  • Size

    5.3MB

  • Sample

    220311-r8z22ahhe6

  • MD5

    876b71d32631eb0980cf48e839566204

  • SHA1

    6bf0b1b8a5a55ee7146ade30257c65b04922889c

  • SHA256

    eca6a8e08b30d190a4956e417f1089bde8987aa4377ca40300eea99794d298d6

  • SHA512

    661f2d3ab2b8aa6ca580e93dd564504b2b68d5635fe0ac5e9fd730f690a1e7c3abbf4c8ac95d85003c87ebaedf236d37fc1203dc145d41b478bdd04c6a2fe7dc

Malware Config

Targets

    • Target

      Disbalancer.exe

    • Size

      5.3MB

    • MD5

      876b71d32631eb0980cf48e839566204

    • SHA1

      6bf0b1b8a5a55ee7146ade30257c65b04922889c

    • SHA256

      eca6a8e08b30d190a4956e417f1089bde8987aa4377ca40300eea99794d298d6

    • SHA512

      661f2d3ab2b8aa6ca580e93dd564504b2b68d5635fe0ac5e9fd730f690a1e7c3abbf4c8ac95d85003c87ebaedf236d37fc1203dc145d41b478bdd04c6a2fe7dc

    • PhoenixStealer

      PhoenixStealer is an information stealer written in the C++, it sends the stolen information to cybercriminals.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks