General

  • Target

    ae43160d7dad131c3bacdf5ff482a428523de85a35e874d1906fd7f9c68ed97f

  • Size

    7.2MB

  • Sample

    220727-xh46yscce9

  • MD5

    172a7890019407d97763bf98a16c784b

  • SHA1

    95a0d75e65bbe26a1a7f16c48ec8c2c62e499877

  • SHA256

    ae43160d7dad131c3bacdf5ff482a428523de85a35e874d1906fd7f9c68ed97f

  • SHA512

    1d8e941cdb844c55a5954af443f15e9579544ade1b961f6a57550ad13b8c21fdeae20064e4a8adb89f921a598a000f2e108fc5f83c8a21e889d4c2a914b34263

Malware Config

Targets

    • Target

      ae43160d7dad131c3bacdf5ff482a428523de85a35e874d1906fd7f9c68ed97f

    • Size

      7.2MB

    • MD5

      172a7890019407d97763bf98a16c784b

    • SHA1

      95a0d75e65bbe26a1a7f16c48ec8c2c62e499877

    • SHA256

      ae43160d7dad131c3bacdf5ff482a428523de85a35e874d1906fd7f9c68ed97f

    • SHA512

      1d8e941cdb844c55a5954af443f15e9579544ade1b961f6a57550ad13b8c21fdeae20064e4a8adb89f921a598a000f2e108fc5f83c8a21e889d4c2a914b34263

    Score
    3/10
    • Target

      Setup/Setup.exe

    • Size

      385.9MB

    • MD5

      0cc8c8d79c0eb8352305dc80d4c7d28a

    • SHA1

      e9b479a3f4b33d3ebcc41d21584fd7abc26d28e0

    • SHA256

      1f312cb92e5c7cc484f5c343efd701d8bb750a66be308f6aa863632a4c4a198b

    • SHA512

      0d0e541291bc3538d5492edb4867861ec1213167430ed0c5537d08e66d834a20a67d0cd8c839b81b0de7d6a9c3c45a661c6d7d178885cd73da7cb529408c15e3

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Credentials in Files

3
T1081

Discovery

System Information Discovery

4
T1082

Query Registry

4
T1012

Virtualization/Sandbox Evasion

1
T1497

Collection

Data from Local System

3
T1005

Tasks