General

  • Target

    d8c84e9dbdaad8d5d3355785e929639dc6c73006efb55818dbe1ce2317e6fd1d

  • Size

    743KB

  • Sample

    221123-s3n81sfh9z

  • MD5

    0c6b37aea42bf7a2a0869d35cb7f2400

  • SHA1

    f6d1e57cd3aefef7bf2823ad081217e8f16db198

  • SHA256

    d8c84e9dbdaad8d5d3355785e929639dc6c73006efb55818dbe1ce2317e6fd1d

  • SHA512

    696481dfa4e0b44b84650e8095e9a56e326047c537294eaf2bee8176c16309415a9b8b27d744096139ce05e067090495db7ea5a6de664a475949528dc9b1a27d

  • SSDEEP

    12288:HCMaZ3Y8XiQFtgBOZm3XuXNDOXKs2+Y9Jf9ywTmEVXCa6Jl6AzqNE+wNE:iM3IjFtgomH0kH2+Y9V0ObCa63VONE+w

Malware Config

Targets

    • Target

      d8c84e9dbdaad8d5d3355785e929639dc6c73006efb55818dbe1ce2317e6fd1d

    • Size

      743KB

    • MD5

      0c6b37aea42bf7a2a0869d35cb7f2400

    • SHA1

      f6d1e57cd3aefef7bf2823ad081217e8f16db198

    • SHA256

      d8c84e9dbdaad8d5d3355785e929639dc6c73006efb55818dbe1ce2317e6fd1d

    • SHA512

      696481dfa4e0b44b84650e8095e9a56e326047c537294eaf2bee8176c16309415a9b8b27d744096139ce05e067090495db7ea5a6de664a475949528dc9b1a27d

    • SSDEEP

      12288:HCMaZ3Y8XiQFtgBOZm3XuXNDOXKs2+Y9Jf9ywTmEVXCa6Jl6AzqNE+wNE:iM3IjFtgomH0kH2+Y9V0ObCa63VONE+w

    • Checks for common network interception software

      Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

    • Enumerates VirtualBox registry keys

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

1
T1112

Discovery

Software Discovery

1
T1518

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

Tasks