General

  • Target

    payload3.zip

  • Size

    13.6MB

  • Sample

    230330-q2zl9ach63

  • MD5

    8e9fe712ba816f4e565ea1f7c6a08d6b

  • SHA1

    0ef74e3dc386f3a76e528f2f9b1e29049c16f8d8

  • SHA256

    43ae56fbf1f9043543f0f868e6891b426fe87802fffb1d563685d0f26313a9ea

  • SHA512

    c3b5bb60dad368d0f7a393a95d3ec8c9ed37d22ce83f324329884e47c8e0d099db7ae9ebdd8a6ccedc5027333530e2d67987eb2982c87d03499655e14abffbe1

  • SSDEEP

    393216:4Kc/OzPaBcgBcu+gDk4bwwTdtqGa8pKoPClK6:bcmz8cWgQnwqvqowoKln

Malware Config

Targets

    • Target

      payload3.zip

    • Size

      13.6MB

    • MD5

      8e9fe712ba816f4e565ea1f7c6a08d6b

    • SHA1

      0ef74e3dc386f3a76e528f2f9b1e29049c16f8d8

    • SHA256

      43ae56fbf1f9043543f0f868e6891b426fe87802fffb1d563685d0f26313a9ea

    • SHA512

      c3b5bb60dad368d0f7a393a95d3ec8c9ed37d22ce83f324329884e47c8e0d099db7ae9ebdd8a6ccedc5027333530e2d67987eb2982c87d03499655e14abffbe1

    • SSDEEP

      393216:4Kc/OzPaBcgBcu+gDk4bwwTdtqGa8pKoPClK6:bcmz8cWgQnwqvqowoKln

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Tasks