General

  • Target

    faa2000db8db27de75f4ae9d0d7aa182d6466cb08d998c59e0c0756ca855381c

  • Size

    37.6MB

  • Sample

    221123-j1982abg2w

  • MD5

    7581fb2cc81fca45413a91300d7950aa

  • SHA1

    34f52d5a0265cd590dc836200afa2351e86a9d83

  • SHA256

    faa2000db8db27de75f4ae9d0d7aa182d6466cb08d998c59e0c0756ca855381c

  • SHA512

    71d7f94a48a9a41a2cd4cc51c8b0f30dde3ebcbc6f66b7f9d72e705e0aeb84d001b92efb9f3d85e074f5b2740c745a7d4a1fc395175a5c1f1ecd512b0db5ef0d

  • SSDEEP

    786432:1AhYBD8yAKc8pyNkcTUMMlkSyF5CMOIzYL7nPeSV5LuYu25ZPi0:6iD8yByN5akB5CMzzGnPecLTu25Y0

Malware Config

Targets

    • Target

      faa2000db8db27de75f4ae9d0d7aa182d6466cb08d998c59e0c0756ca855381c

    • Size

      37.6MB

    • MD5

      7581fb2cc81fca45413a91300d7950aa

    • SHA1

      34f52d5a0265cd590dc836200afa2351e86a9d83

    • SHA256

      faa2000db8db27de75f4ae9d0d7aa182d6466cb08d998c59e0c0756ca855381c

    • SHA512

      71d7f94a48a9a41a2cd4cc51c8b0f30dde3ebcbc6f66b7f9d72e705e0aeb84d001b92efb9f3d85e074f5b2740c745a7d4a1fc395175a5c1f1ecd512b0db5ef0d

    • SSDEEP

      786432:1AhYBD8yAKc8pyNkcTUMMlkSyF5CMOIzYL7nPeSV5LuYu25ZPi0:6iD8yByN5akB5CMzzGnPecLTu25Y0

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks