General

  • Target

    94ee65ddfcc4a2d8f3780a62119f5b4a.exe

  • Size

    6.3MB

  • Sample

    230329-wzbqashd52

  • MD5

    94ee65ddfcc4a2d8f3780a62119f5b4a

  • SHA1

    7076231893173609119979e457d9150640d3cca5

  • SHA256

    88480be3d2058784c6005e4e0daef5f963087c3c05e50576f523ef8b0a8d5311

  • SHA512

    288b4aa99612b631b7677561345a642f7cd544f0c35b9b12779bb37f31a9da500025c218bd4b0fae445fb100b50beb66c42003a897a474b351eb2050d6a7f1e8

  • SSDEEP

    98304:M1XL+7LPxtELzVsW3FYPen2vJwMpjgmgIp4UNqhq8sfoeK+7RuFC+HourokI:MNq7rxYVsImq2vJwM14h/9vXbrod

Malware Config

Targets

    • Target

      94ee65ddfcc4a2d8f3780a62119f5b4a.exe

    • Size

      6.3MB

    • MD5

      94ee65ddfcc4a2d8f3780a62119f5b4a

    • SHA1

      7076231893173609119979e457d9150640d3cca5

    • SHA256

      88480be3d2058784c6005e4e0daef5f963087c3c05e50576f523ef8b0a8d5311

    • SHA512

      288b4aa99612b631b7677561345a642f7cd544f0c35b9b12779bb37f31a9da500025c218bd4b0fae445fb100b50beb66c42003a897a474b351eb2050d6a7f1e8

    • SSDEEP

      98304:M1XL+7LPxtELzVsW3FYPen2vJwMpjgmgIp4UNqhq8sfoeK+7RuFC+HourokI:MNq7rxYVsImq2vJwM14h/9vXbrod

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

6
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

6
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

2
T1005

Tasks