General

  • Target

    33d6bd1df5aec9d87bf129094b1dac54ad6f918ab728d99843112ceb37244a5c

  • Size

    580KB

  • Sample

    221127-tns44aag83

  • MD5

    73a46a0ee906028767aa6b65dd917ad2

  • SHA1

    409c0650615d73e41b7dc88b8e69237609bda1ac

  • SHA256

    33d6bd1df5aec9d87bf129094b1dac54ad6f918ab728d99843112ceb37244a5c

  • SHA512

    8d8d7aeb48dc1b59fadd25ea9d824df1b5a85747a46f395aebef6cdd58c6939703bd1c36e16c7d9529c3fcf3e2c202e780f136250a982774e0966044989d6fb5

  • SSDEEP

    6144:M+7RfkD95BA+y7cKck2lJYd15F5CCN7hd6Ml+ou/wZ0Hr8v+DCroligEDas+:M4NkD934QE5F5xhYMmoWgQCrj

Malware Config

Targets

    • Target

      33d6bd1df5aec9d87bf129094b1dac54ad6f918ab728d99843112ceb37244a5c

    • Size

      580KB

    • MD5

      73a46a0ee906028767aa6b65dd917ad2

    • SHA1

      409c0650615d73e41b7dc88b8e69237609bda1ac

    • SHA256

      33d6bd1df5aec9d87bf129094b1dac54ad6f918ab728d99843112ceb37244a5c

    • SHA512

      8d8d7aeb48dc1b59fadd25ea9d824df1b5a85747a46f395aebef6cdd58c6939703bd1c36e16c7d9529c3fcf3e2c202e780f136250a982774e0966044989d6fb5

    • SSDEEP

      6144:M+7RfkD95BA+y7cKck2lJYd15F5CCN7hd6Ml+ou/wZ0Hr8v+DCroligEDas+:M4NkD934QE5F5xhYMmoWgQCrj

    • Checks for common network interception software

      Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

    • Enumerates VirtualBox registry keys

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

1
T1112

Discovery

Software Discovery

1
T1518

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

Tasks