General

  • Target

    file

  • Size

    4.4MB

  • Sample

    220823-rqq2eagch9

  • MD5

    c07c4f442fe80b363a46db36d86c33c9

  • SHA1

    6859b0a21bd4d4ac81d6be2c863a6aec872c0ab7

  • SHA256

    ffc8f608eaae685aaac75daef134d536de17e3cecfcb259b645bf3479022bf62

  • SHA512

    b229397d606885c84676c283fa291b0ca3af83ee566a05a6f0f7e7658fcf614c5b8aa9e7038578a320190ff5556a6e1bc549d26b58d2b26f28e9050b4271a727

  • SSDEEP

    98304:8kpGYzAkhZcVZ0IqeBesk05JwNz8tUHc8XTJafe:PhSZ0Iqew7uJOzcU70e

Malware Config

Targets

    • Target

      file

    • Size

      4.4MB

    • MD5

      c07c4f442fe80b363a46db36d86c33c9

    • SHA1

      6859b0a21bd4d4ac81d6be2c863a6aec872c0ab7

    • SHA256

      ffc8f608eaae685aaac75daef134d536de17e3cecfcb259b645bf3479022bf62

    • SHA512

      b229397d606885c84676c283fa291b0ca3af83ee566a05a6f0f7e7658fcf614c5b8aa9e7038578a320190ff5556a6e1bc549d26b58d2b26f28e9050b4271a727

    • SSDEEP

      98304:8kpGYzAkhZcVZ0IqeBesk05JwNz8tUHc8XTJafe:PhSZ0Iqew7uJOzcU70e

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks