General

  • Target

    v2.exe

  • Size

    8.2MB

  • Sample

    221206-tyedpadf54

  • MD5

    396eb05ac1e4ece13243280b2c69c85b

  • SHA1

    721db11d80b91c5a826114b7bfae73de43029e70

  • SHA256

    6fd08847eca136b3099d476c9c78600a88aaaed6378f411b955b281908a75fac

  • SHA512

    f03ca5330751685e42f3ebf7f36ae7a01329361d2cbccf4a1bb653e6c122a1ac88f3565c09480ac030d57f9a6e2630ea76a362b2c2af2b04fc9272bb2408943e

  • SSDEEP

    196608:Xs8AtIGFmr/pOhL18xzIzaVT8x+1vNc9Eh9J1Ap4I:8pIGUYhLtmc2vNc9El1g4

Malware Config

Targets

    • Target

      v2.exe

    • Size

      8.2MB

    • MD5

      396eb05ac1e4ece13243280b2c69c85b

    • SHA1

      721db11d80b91c5a826114b7bfae73de43029e70

    • SHA256

      6fd08847eca136b3099d476c9c78600a88aaaed6378f411b955b281908a75fac

    • SHA512

      f03ca5330751685e42f3ebf7f36ae7a01329361d2cbccf4a1bb653e6c122a1ac88f3565c09480ac030d57f9a6e2630ea76a362b2c2af2b04fc9272bb2408943e

    • SSDEEP

      196608:Xs8AtIGFmr/pOhL18xzIzaVT8x+1vNc9Eh9J1Ap4I:8pIGUYhLtmc2vNc9El1g4

    • ElysiumStealer

      ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.

    • ElysiumStealer Support DLL

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks