General

  • Target

    3f302fd58e30e4708afc25f56cbc448542ab7d0a77a0c122804c502cc932c61a

  • Size

    7.0MB

  • Sample

    220727-xhyzyagecl

  • MD5

    f6b8435fa2a8b06d1a01d0aa79e83f88

  • SHA1

    bc8ebd59069fee6a371f0f43ea6be911449cd247

  • SHA256

    3f302fd58e30e4708afc25f56cbc448542ab7d0a77a0c122804c502cc932c61a

  • SHA512

    7475ac87e1a01dd6cddecbd110850402d19678ccc75e8cbbc59f211aa1b1dbfb8425b4fbb0604c80bcce0786a2793c53311895e34231608d8aa77bd127dafa96

Malware Config

Targets

    • Target

      3f302fd58e30e4708afc25f56cbc448542ab7d0a77a0c122804c502cc932c61a

    • Size

      7.0MB

    • MD5

      f6b8435fa2a8b06d1a01d0aa79e83f88

    • SHA1

      bc8ebd59069fee6a371f0f43ea6be911449cd247

    • SHA256

      3f302fd58e30e4708afc25f56cbc448542ab7d0a77a0c122804c502cc932c61a

    • SHA512

      7475ac87e1a01dd6cddecbd110850402d19678ccc75e8cbbc59f211aa1b1dbfb8425b4fbb0604c80bcce0786a2793c53311895e34231608d8aa77bd127dafa96

    Score
    3/10
    • Target

      Setup/Setup.exe

    • Size

      370.7MB

    • MD5

      98d23640b46993f245563f123ba4d0c0

    • SHA1

      47cd004517b2403705edfba3006438ede64375e5

    • SHA256

      6300f59bb2ecfa05d2da11f61cfe0a67f8bc46b33b383621c80a7187cfe6d52a

    • SHA512

      0d9a7ecccd1937dd812d487dbcec17775a6f720b43607fc37979d8c05b1547d46acb1ce34f8416c100a450dc40c388f2c5a6bb65792f87ca64250279b34aedbb

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Credentials in Files

3
T1081

Discovery

System Information Discovery

4
T1082

Query Registry

4
T1012

Virtualization/Sandbox Evasion

1
T1497

Collection

Data from Local System

3
T1005

Tasks