General

  • Target

    IMG_7565.png

  • Size

    1.1MB

  • Sample

    230315-3j847afh55

  • MD5

    56a935fae32e813011332c51f3b0863a

  • SHA1

    14c969bd4f003b79cd8386ccf469f647c140e95d

  • SHA256

    21e0eaa86677b2be0f72f3d1f9257cf34acc306cd900e59d792efb12f3232133

  • SHA512

    751d42a733bacc7d43de1370f8f9db27e90d3620fa644f4164a7fec1c18df419cdbb93fabeee32bcdbe96cb88fcbc762e3c7bc59deed47c2c6455d8371a5ab29

  • SSDEEP

    24576:Il6G46azkB1E6nxeQ7GkjRUYOa6LD8746RcmN+VfhBjHtU7SY+J:Ill4EB1Ln06GkjRUO6LD8k6dIDSuYU

Malware Config

Targets

    • Target

      IMG_7565.png

    • Size

      1.1MB

    • MD5

      56a935fae32e813011332c51f3b0863a

    • SHA1

      14c969bd4f003b79cd8386ccf469f647c140e95d

    • SHA256

      21e0eaa86677b2be0f72f3d1f9257cf34acc306cd900e59d792efb12f3232133

    • SHA512

      751d42a733bacc7d43de1370f8f9db27e90d3620fa644f4164a7fec1c18df419cdbb93fabeee32bcdbe96cb88fcbc762e3c7bc59deed47c2c6455d8371a5ab29

    • SSDEEP

      24576:Il6G46azkB1E6nxeQ7GkjRUYOa6LD8746RcmN+VfhBjHtU7SY+J:Ill4EB1Ln06GkjRUO6LD8k6dIDSuYU

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks