General

  • Target

    e388c7a9669dbaeb03e7b9aac9f8103171e44fe767a6270bcc922054e90ef343

  • Size

    4.0MB

  • Sample

    220706-xbfj1sfheq

  • MD5

    3a1092aa460540bcd35e203546b64fd3

  • SHA1

    03882edef15af619f8df6ab69667282f27894a5f

  • SHA256

    e388c7a9669dbaeb03e7b9aac9f8103171e44fe767a6270bcc922054e90ef343

  • SHA512

    1ad275b1d7551076761b621835f6b3cd7b8d717289229beb47e4c15812976e5d1df92e1a9734a29ae06d8ccb27b03f90bbf1be63a1b635bf82dbb5c3614a9c7b

Malware Config

Targets

    • Target

      e388c7a9669dbaeb03e7b9aac9f8103171e44fe767a6270bcc922054e90ef343

    • Size

      4.0MB

    • MD5

      3a1092aa460540bcd35e203546b64fd3

    • SHA1

      03882edef15af619f8df6ab69667282f27894a5f

    • SHA256

      e388c7a9669dbaeb03e7b9aac9f8103171e44fe767a6270bcc922054e90ef343

    • SHA512

      1ad275b1d7551076761b621835f6b3cd7b8d717289229beb47e4c15812976e5d1df92e1a9734a29ae06d8ccb27b03f90bbf1be63a1b635bf82dbb5c3614a9c7b

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Persistence

Modify Existing Service

1
T1031

Hidden Files and Directories

2
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Hidden Files and Directories

2
T1158

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Collection

Data from Local System

2
T1005

Tasks