General

  • Target

    dacee3f82b160a1d77423f175dc4892af1cfc8e8d3cb3e6b238bc29ee93e5bce

  • Size

    1.0MB

  • Sample

    221125-hrev4ahe67

  • MD5

    8b3bc05c13a12eb91efcca3ce01881ad

  • SHA1

    b8ba09f34c16cb49217cd1a4bbb38b2fcad2aa29

  • SHA256

    dacee3f82b160a1d77423f175dc4892af1cfc8e8d3cb3e6b238bc29ee93e5bce

  • SHA512

    2c5181a37d1d5ad5b31ac488d192a5356ea344f76a594fefc60eb7f98cb8462daf8c64a8e3ef41b4fa6db6c2fd093f84fc2921da594131a3963d8cadd2b87174

  • SSDEEP

    24576:RPkYsWGlrQhT73fyXvvEFGNIsw5QRK4LG:yY/GlwT73fyXUFMICE4LG

Malware Config

Targets

    • Target

      dacee3f82b160a1d77423f175dc4892af1cfc8e8d3cb3e6b238bc29ee93e5bce

    • Size

      1.0MB

    • MD5

      8b3bc05c13a12eb91efcca3ce01881ad

    • SHA1

      b8ba09f34c16cb49217cd1a4bbb38b2fcad2aa29

    • SHA256

      dacee3f82b160a1d77423f175dc4892af1cfc8e8d3cb3e6b238bc29ee93e5bce

    • SHA512

      2c5181a37d1d5ad5b31ac488d192a5356ea344f76a594fefc60eb7f98cb8462daf8c64a8e3ef41b4fa6db6c2fd093f84fc2921da594131a3963d8cadd2b87174

    • SSDEEP

      24576:RPkYsWGlrQhT73fyXvvEFGNIsw5QRK4LG:yY/GlwT73fyXUFMICE4LG

    • Checks for common network interception software

      Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

    • Enumerates VirtualBox registry keys

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

1
T1112

Discovery

Software Discovery

1
T1518

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

Tasks