Resubmissions

07-12-2023 09:21

231207-lbdjwaha23 10

07-04-2023 10:31

230407-mkc55sgh63 10

General

  • Target

    4c845a5d9a6939e82ebb8035fd66cfa9.exe

  • Size

    6MB

  • Sample

    230407-mkc55sgh63

  • MD5

    4c845a5d9a6939e82ebb8035fd66cfa9

  • SHA1

    f90920eafa7021467b9bbf3838d2b409dbef07d8

  • SHA256

    d70046ddee32d343d86ba2b892343a61360aa7b980e5c12f0fc6fd5c8ef5259c

  • SHA512

    3e7e99b87482c7acff8685f6cdbd5d9e09c472e866d2b283f616b674d775aa501ce6b14677b93c6c345f01691de519e4ba5d90ed7f6a5dfdf137b4d6ce78bf06

  • SSDEEP

    98304:XeDSL2Ifrprq2Q53WsBz8y5VK5Rtt3MJdpWlNrym198IFG++R6k7j3xxyRh9z/dl:XSSL2I1Yhz8xLzQpwsOnFkRbv3LyXi

Malware Config

Targets

    • Target

      4c845a5d9a6939e82ebb8035fd66cfa9.exe

    • Size

      6MB

    • MD5

      4c845a5d9a6939e82ebb8035fd66cfa9

    • SHA1

      f90920eafa7021467b9bbf3838d2b409dbef07d8

    • SHA256

      d70046ddee32d343d86ba2b892343a61360aa7b980e5c12f0fc6fd5c8ef5259c

    • SHA512

      3e7e99b87482c7acff8685f6cdbd5d9e09c472e866d2b283f616b674d775aa501ce6b14677b93c6c345f01691de519e4ba5d90ed7f6a5dfdf137b4d6ce78bf06

    • SSDEEP

      98304:XeDSL2Ifrprq2Q53WsBz8y5VK5Rtt3MJdpWlNrym198IFG++R6k7j3xxyRh9z/dl:XSSL2I1Yhz8xLzQpwsOnFkRbv3LyXi

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

6
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

6
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

2
T1005

Tasks