General

  • Target

    15d06d1741cc8b5495da9c79c6f630e33060e80c73da9666500f6f0bdf5ff259

  • Size

    3.9MB

  • Sample

    220706-w84sfaaba8

  • MD5

    095715a96975ef7b9e17d0a39739e0cc

  • SHA1

    aa090944875fb9bd5b1e8b3775592eea5ceeb186

  • SHA256

    15d06d1741cc8b5495da9c79c6f630e33060e80c73da9666500f6f0bdf5ff259

  • SHA512

    ab76c374c995501ef57c4f46602e0df16188ccb6f69bb4c9c84073e48c664000912353a47ed5758c48735c64ca1167f73b02c41d4cfefea9978e3a219c12ce11

Malware Config

Targets

    • Target

      15d06d1741cc8b5495da9c79c6f630e33060e80c73da9666500f6f0bdf5ff259

    • Size

      3.9MB

    • MD5

      095715a96975ef7b9e17d0a39739e0cc

    • SHA1

      aa090944875fb9bd5b1e8b3775592eea5ceeb186

    • SHA256

      15d06d1741cc8b5495da9c79c6f630e33060e80c73da9666500f6f0bdf5ff259

    • SHA512

      ab76c374c995501ef57c4f46602e0df16188ccb6f69bb4c9c84073e48c664000912353a47ed5758c48735c64ca1167f73b02c41d4cfefea9978e3a219c12ce11

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Persistence

Modify Existing Service

1
T1031

Hidden Files and Directories

2
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Hidden Files and Directories

2
T1158

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Collection

Data from Local System

2
T1005

Tasks