General

  • Target

    Setup_13.exe

  • Size

    371.6MB

  • Sample

    220727-xygqlacea4

  • MD5

    6dca4c6fbbc71f493212ee52a8de5de7

  • SHA1

    9c0bcb01b9c892a36d93a667eb554652d0881a29

  • SHA256

    85ba0f7790c50a07ef1cb227c452074fd3bfc7a3e94a6a7479bdb8470399086b

  • SHA512

    ea82e353d81b79285c9898234821efe425529ad1d4b9afcb07cceaff63c836b6616ac7b3850627d2be1dcbb93e40b439fcb337eab1809c9a31befaead13b6cd8

Malware Config

Targets

    • Target

      Setup_13.exe

    • Size

      371.6MB

    • MD5

      6dca4c6fbbc71f493212ee52a8de5de7

    • SHA1

      9c0bcb01b9c892a36d93a667eb554652d0881a29

    • SHA256

      85ba0f7790c50a07ef1cb227c452074fd3bfc7a3e94a6a7479bdb8470399086b

    • SHA512

      ea82e353d81b79285c9898234821efe425529ad1d4b9afcb07cceaff63c836b6616ac7b3850627d2be1dcbb93e40b439fcb337eab1809c9a31befaead13b6cd8

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

5
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

5
T1082

Collection

Data from Local System

3
T1005

Tasks