General

  • Target

    b2b_2022-03-20_00-04.exe

  • Size

    298KB

  • Sample

    220321-dmtq8sggg3

  • MD5

    773c9670c70dd5c465ad8e57a39ae55a

  • SHA1

    dc117d5ecfdea361e0c31568c3a78714461ad02b

  • SHA256

    e6ccc7cc7154361faaf1994b3395a27bb0b8a97f002e28bcdba5e9901793bb00

  • SHA512

    265e1d19da3f1a13a25fc2dd6a12cfff484520e1228517d57dfb9cb4ff171bc4d4f986321eba619dbbb77019c714daf1b6bcd7c9dc921ddcee86ef0b25aa2dac

Malware Config

Targets

    • Target

      b2b_2022-03-20_00-04.exe

    • Size

      298KB

    • MD5

      773c9670c70dd5c465ad8e57a39ae55a

    • SHA1

      dc117d5ecfdea361e0c31568c3a78714461ad02b

    • SHA256

      e6ccc7cc7154361faaf1994b3395a27bb0b8a97f002e28bcdba5e9901793bb00

    • SHA512

      265e1d19da3f1a13a25fc2dd6a12cfff484520e1228517d57dfb9cb4ff171bc4d4f986321eba619dbbb77019c714daf1b6bcd7c9dc921ddcee86ef0b25aa2dac

    • VKeylogger

      A keylogger first seen in Nov 2020.

    • VKeylogger Payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks