General

  • Target

    84045a89e00b777367e9745643737906d1324273063196d44ebadccec5298204

  • Size

    697KB

  • Sample

    221124-2w3mhaec36

  • MD5

    4c10861f6c54ceb52e18138af4de5868

  • SHA1

    0eb9dab17905e27e34c857bdd230c3b3bde52ec3

  • SHA256

    84045a89e00b777367e9745643737906d1324273063196d44ebadccec5298204

  • SHA512

    376fb0960aea86ffd000f52201b1aaa2f00416468b5c017e786356bc2bf3aee7f26a61842b327446f9db25459c8440d05bbc0e870eb95cd824bccda0890d0873

  • SSDEEP

    6144:mXlsRIo0K7Td3oG6R6dDiQ8+9nWkWIGmtJQGTJw+h9YGy0ZW+oxiFhGulEkyY:KAILk4G6RaU+8mtJRlYGB4+YiFhz2N

Malware Config

Targets

    • Target

      84045a89e00b777367e9745643737906d1324273063196d44ebadccec5298204

    • Size

      697KB

    • MD5

      4c10861f6c54ceb52e18138af4de5868

    • SHA1

      0eb9dab17905e27e34c857bdd230c3b3bde52ec3

    • SHA256

      84045a89e00b777367e9745643737906d1324273063196d44ebadccec5298204

    • SHA512

      376fb0960aea86ffd000f52201b1aaa2f00416468b5c017e786356bc2bf3aee7f26a61842b327446f9db25459c8440d05bbc0e870eb95cd824bccda0890d0873

    • SSDEEP

      6144:mXlsRIo0K7Td3oG6R6dDiQ8+9nWkWIGmtJQGTJw+h9YGy0ZW+oxiFhGulEkyY:KAILk4G6RaU+8mtJRlYGB4+YiFhz2N

    • Checks for common network interception software

      Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

    • Enumerates VirtualBox registry keys

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

1
T1112

Discovery

Software Discovery

1
T1518

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

Tasks