General

  • Target

    eb0deb25600ed4bd927e310f825278f412178e91523c38215555ef5f55aa568e

  • Size

    1.8MB

  • Sample

    221125-hmm1xacf7w

  • MD5

    844ae729e51154cd161ecc3b9addc20d

  • SHA1

    93f671334d4838cd6e3f632dd21dfae47fc742b5

  • SHA256

    eb0deb25600ed4bd927e310f825278f412178e91523c38215555ef5f55aa568e

  • SHA512

    cf5324caf2aef459afd2630a0b4f8fff6a6e8e10c0bfa16c58de9a0c3832ae1179bb8b745b18f2641516d319b285dd44e7b64a7b27e1723b8cc19cd3593e19cd

  • SSDEEP

    49152:Vb9j4giaUnc+cKsyn1bnen3gjAX61cVwmc+UmHkK7OSlzS:jBiaUnc/Kh1benQm614wIUmEPSlzS

Malware Config

Targets

    • Target

      eb0deb25600ed4bd927e310f825278f412178e91523c38215555ef5f55aa568e

    • Size

      1.8MB

    • MD5

      844ae729e51154cd161ecc3b9addc20d

    • SHA1

      93f671334d4838cd6e3f632dd21dfae47fc742b5

    • SHA256

      eb0deb25600ed4bd927e310f825278f412178e91523c38215555ef5f55aa568e

    • SHA512

      cf5324caf2aef459afd2630a0b4f8fff6a6e8e10c0bfa16c58de9a0c3832ae1179bb8b745b18f2641516d319b285dd44e7b64a7b27e1723b8cc19cd3593e19cd

    • SSDEEP

      49152:Vb9j4giaUnc+cKsyn1bnen3gjAX61cVwmc+UmHkK7OSlzS:jBiaUnc/Kh1benQm614wIUmEPSlzS

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Registers COM server for autorun

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Browser Extensions

1
T1176

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Modify Registry

4
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Tasks