General

  • Target

    2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e

  • Size

    938KB

  • Sample

    220414-hprrwaadhn

  • MD5

    6b2c64128bf247c7b987c65c9de3f81c

  • SHA1

    1629ef7f8e13baa063afc0f97a5cb755b68e331f

  • SHA256

    2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e

  • SHA512

    11ac5c09556cf0d99a7ad5d38ca397edcb4c9ce188706729f85b56eb07973d448bed9c8864b542a51e25f33dec6f5b1c4499b95855874b3113b8becc3a6114bb

Malware Config

Targets

    • Target

      2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e

    • Size

      938KB

    • MD5

      6b2c64128bf247c7b987c65c9de3f81c

    • SHA1

      1629ef7f8e13baa063afc0f97a5cb755b68e331f

    • SHA256

      2714b7aea9d62bafe4a3a08feca334677e8ee835441fb20fa29454b8e6c3a81e

    • SHA512

      11ac5c09556cf0d99a7ad5d38ca397edcb4c9ce188706729f85b56eb07973d448bed9c8864b542a51e25f33dec6f5b1c4499b95855874b3113b8becc3a6114bb

    • Meta Stealer Stealer

      Meta Stealer steals passwords stored in browsers, written in C++.

    • suricata: ET MALWARE Possible Malicious Macro DL EXE Feb 2016

      suricata: ET MALWARE Possible Malicious Macro DL EXE Feb 2016

    • suricata: ET MALWARE Possible Malicious Macro EXE DL AlphaNumL

      suricata: ET MALWARE Possible Malicious Macro EXE DL AlphaNumL

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks