General

  • Target

    30b08b811058c44c8e892dd894cbe6ecbd660cb233b84732c7e3742ef770ab7f

  • Size

    4.3MB

  • Sample

    220525-amc7pscha5

  • MD5

    8224815c8c0c61c69ea1a557609164cc

  • SHA1

    8713e77ff6b3734189fc79ce347596ef73f1e0e9

  • SHA256

    30b08b811058c44c8e892dd894cbe6ecbd660cb233b84732c7e3742ef770ab7f

  • SHA512

    8b657df0edc65fcc86f3d70a7231c9f91485ec10eb36a7979a0deda301da36fdfbc1322931d86db0f8a57afe64e361a036b26cdaf72162de5f25e23c7a7ac757

Malware Config

Targets

    • Target

      30b08b811058c44c8e892dd894cbe6ecbd660cb233b84732c7e3742ef770ab7f

    • Size

      4.3MB

    • MD5

      8224815c8c0c61c69ea1a557609164cc

    • SHA1

      8713e77ff6b3734189fc79ce347596ef73f1e0e9

    • SHA256

      30b08b811058c44c8e892dd894cbe6ecbd660cb233b84732c7e3742ef770ab7f

    • SHA512

      8b657df0edc65fcc86f3d70a7231c9f91485ec10eb36a7979a0deda301da36fdfbc1322931d86db0f8a57afe64e361a036b26cdaf72162de5f25e23c7a7ac757

    • Enumerates VirtualBox registry keys

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Looks for VirtualBox Guest Additions in registry

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Defense Evasion

Virtualization/Sandbox Evasion

3
T1497

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

5
T1012

Virtualization/Sandbox Evasion

3
T1497

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks