General

  • Target

    964210bbe9ccdd4289aafb49fe2eba8f.exe

  • Size

    6.9MB

  • Sample

    230318-jr5besbf52

  • MD5

    964210bbe9ccdd4289aafb49fe2eba8f

  • SHA1

    07f0d6cbcbb41009f81e325c33ab8b94e0c35d6d

  • SHA256

    68dbf9ee186dd2a81142d255b9d384b9a5886a576bec570bdfa76e9ee9a7a39e

  • SHA512

    515274fef4f183b7cf67b74de479623449ad707d102c811414bd797a51f38b990f698aa1c5895b26fa0c71608a5a3e93604bf05b9da30ec5a26d88a9316ffa9e

  • SSDEEP

    98304:gt3yRBVbDaNePUgYwn2hkAABPRVbu8Bn1jmd2XFpurnlWkPUvCOuZGj/JflYVY+:6yBbLPUgYlaHnBnBDFpu7MUUvbuZU/M

Malware Config

Targets

    • Target

      964210bbe9ccdd4289aafb49fe2eba8f.exe

    • Size

      6.9MB

    • MD5

      964210bbe9ccdd4289aafb49fe2eba8f

    • SHA1

      07f0d6cbcbb41009f81e325c33ab8b94e0c35d6d

    • SHA256

      68dbf9ee186dd2a81142d255b9d384b9a5886a576bec570bdfa76e9ee9a7a39e

    • SHA512

      515274fef4f183b7cf67b74de479623449ad707d102c811414bd797a51f38b990f698aa1c5895b26fa0c71608a5a3e93604bf05b9da30ec5a26d88a9316ffa9e

    • SSDEEP

      98304:gt3yRBVbDaNePUgYwn2hkAABPRVbu8Bn1jmd2XFpurnlWkPUvCOuZGj/JflYVY+:6yBbLPUgYlaHnBnBDFpu7MUUvbuZU/M

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks