General

  • Target

    f9b232669ddba69256930349ea0bf8b9f947e1b6f3f2f1030b6a22a09c25443f

  • Size

    408KB

  • Sample

    221123-s3bmxsch62

  • MD5

    da30c6d91011090143d24b03c51e7980

  • SHA1

    e2a41a3e7fa7f165f5d7b66bff599a920dd49304

  • SHA256

    f9b232669ddba69256930349ea0bf8b9f947e1b6f3f2f1030b6a22a09c25443f

  • SHA512

    6c862cf69c5e0c170d8a3a64e12a41f8063feb2faf2ef6c6348a0327551cebe5f5725a997e92f9ff7b3932386036c7a6bfae59636f748754cc816ff127030f2c

  • SSDEEP

    12288:ITPiCjKlBkDaBuJRRZDc44lVUvkLJgdQ:IxjKl6DaBURXc4KqsWQ

Malware Config

Targets

    • Target

      f9b232669ddba69256930349ea0bf8b9f947e1b6f3f2f1030b6a22a09c25443f

    • Size

      408KB

    • MD5

      da30c6d91011090143d24b03c51e7980

    • SHA1

      e2a41a3e7fa7f165f5d7b66bff599a920dd49304

    • SHA256

      f9b232669ddba69256930349ea0bf8b9f947e1b6f3f2f1030b6a22a09c25443f

    • SHA512

      6c862cf69c5e0c170d8a3a64e12a41f8063feb2faf2ef6c6348a0327551cebe5f5725a997e92f9ff7b3932386036c7a6bfae59636f748754cc816ff127030f2c

    • SSDEEP

      12288:ITPiCjKlBkDaBuJRRZDc44lVUvkLJgdQ:IxjKl6DaBURXc4KqsWQ

    • Checks for common network interception software

      Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

    • Enumerates VirtualBox registry keys

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks