General

  • Target

    4d3c251b760a689045b55719b1ebb8f43378fdf45a6df942557decebcafe8b69

  • Size

    1.1MB

  • Sample

    221123-rpshvahb82

  • MD5

    9811a2cf1ad3038187857a8aa2dd5b47

  • SHA1

    411eddf59af6a43bf4c65cbfd3c47cacc521d6b9

  • SHA256

    4d3c251b760a689045b55719b1ebb8f43378fdf45a6df942557decebcafe8b69

  • SHA512

    b9a68e25070c88d83aba19539a3b3528ebe37734c47a719bda9432188fa2b52310d17bee6a4908ac1d1363de614dfe038d71d8f6207c4e0cfbe7d163491b202a

  • SSDEEP

    12288:miRW4lNVBrx8CZudbEGOOCSjyLq1dACRmd6DMRvia1e6/8fCvJ5Ww0d:myW4tNi4uJhr+CRuEaTIF

Malware Config

Targets

    • Target

      4d3c251b760a689045b55719b1ebb8f43378fdf45a6df942557decebcafe8b69

    • Size

      1.1MB

    • MD5

      9811a2cf1ad3038187857a8aa2dd5b47

    • SHA1

      411eddf59af6a43bf4c65cbfd3c47cacc521d6b9

    • SHA256

      4d3c251b760a689045b55719b1ebb8f43378fdf45a6df942557decebcafe8b69

    • SHA512

      b9a68e25070c88d83aba19539a3b3528ebe37734c47a719bda9432188fa2b52310d17bee6a4908ac1d1363de614dfe038d71d8f6207c4e0cfbe7d163491b202a

    • SSDEEP

      12288:miRW4lNVBrx8CZudbEGOOCSjyLq1dACRmd6DMRvia1e6/8fCvJ5Ww0d:myW4tNi4uJhr+CRuEaTIF

    • Checks for common network interception software

      Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

    • Enumerates VirtualBox registry keys

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

1
T1112

Discovery

Software Discovery

1
T1518

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

Tasks