General

  • Target

    b50a324ed3240bf5dbd48d02a2d8926e2ce82246e4bd39cb7643f97afde04885

  • Size

    1.1MB

  • Sample

    221127-tq3rbaee91

  • MD5

    af6fcc51224d0a988531fed061dca0b3

  • SHA1

    0e50a7bde3a4cb0ce39ee47a25eb7203386af236

  • SHA256

    b50a324ed3240bf5dbd48d02a2d8926e2ce82246e4bd39cb7643f97afde04885

  • SHA512

    6426fda99009b3f77cb1f97f31507d7cb9126edf010018c18a9d55bea150c19fbbce61dd4ab38fc4cd4ead27057cd7051912ff93c5bc9c8d42f1b0243d70d429

  • SSDEEP

    6144:NMtipohjpRsrj7HQH0/huEtZ6ZlZrADLzZJLe2EfLNJx5TZBtBBhxTJh5Vzd551X:NVwEUk9gk4VTCp9qWF6nJnSSqmD9

Malware Config

Targets

    • Target

      b50a324ed3240bf5dbd48d02a2d8926e2ce82246e4bd39cb7643f97afde04885

    • Size

      1.1MB

    • MD5

      af6fcc51224d0a988531fed061dca0b3

    • SHA1

      0e50a7bde3a4cb0ce39ee47a25eb7203386af236

    • SHA256

      b50a324ed3240bf5dbd48d02a2d8926e2ce82246e4bd39cb7643f97afde04885

    • SHA512

      6426fda99009b3f77cb1f97f31507d7cb9126edf010018c18a9d55bea150c19fbbce61dd4ab38fc4cd4ead27057cd7051912ff93c5bc9c8d42f1b0243d70d429

    • SSDEEP

      6144:NMtipohjpRsrj7HQH0/huEtZ6ZlZrADLzZJLe2EfLNJx5TZBtBBhxTJh5Vzd551X:NVwEUk9gk4VTCp9qWF6nJnSSqmD9

    • Checks for common network interception software

      Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

    • Enumerates VirtualBox registry keys

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

1
T1112

Discovery

Software Discovery

1
T1518

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

Tasks