General

  • Target

    7ba62b0e57cade7dcf5251b53759e93525c6f37d107ef506dcf9c4eec3fd2ffe

  • Size

    5.5MB

  • Sample

    220326-v9ez2afef4

  • MD5

    029234355ca1ab689186c8795602854a

  • SHA1

    d568d0eefc1367d30429c3d26f82c4dd61821d02

  • SHA256

    7ba62b0e57cade7dcf5251b53759e93525c6f37d107ef506dcf9c4eec3fd2ffe

  • SHA512

    4bf5ea4251c2090d33ef97aeb8abfb0ea84ead9dcf16b4b4151ce865204fda4bd130e849bf20a2f58cf49d09842053cd1d865bcdb945764736515e8a6e252bbc

Malware Config

Targets

    • Target

      7ba62b0e57cade7dcf5251b53759e93525c6f37d107ef506dcf9c4eec3fd2ffe

    • Size

      5.5MB

    • MD5

      029234355ca1ab689186c8795602854a

    • SHA1

      d568d0eefc1367d30429c3d26f82c4dd61821d02

    • SHA256

      7ba62b0e57cade7dcf5251b53759e93525c6f37d107ef506dcf9c4eec3fd2ffe

    • SHA512

      4bf5ea4251c2090d33ef97aeb8abfb0ea84ead9dcf16b4b4151ce865204fda4bd130e849bf20a2f58cf49d09842053cd1d865bcdb945764736515e8a6e252bbc

    • VKeylogger

      A keylogger first seen in Nov 2020.

    • VKeylogger Payload

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Process Discovery

1
T1057

Remote System Discovery

1
T1018

Tasks