General

  • Target

    game1 (6).zip

  • Size

    11.8MB

  • Sample

    230503-y9ynxsac91

  • MD5

    395fc5195d25338573d12e09ef2152fb

  • SHA1

    43a5a013b7f1e4dfcbd746a1f63b0fd0ebeeae9a

  • SHA256

    91e7675364595193b02989591cdc5dd4775cb911caf67d462a94fa52c8e4504f

  • SHA512

    af7fea0858e873c724b56c22d174779979acdf9bd1413d8fd020aa3ebe873f0549e0785ee80970abaaf2ac13f1b62bbaa450fe27ed92676cd99d62199799601a

  • SSDEEP

    196608:dVSHrvfCYfxcvBr0hSQY+mwLJhEijn0tgvVeS4sM4fkj3ytwKpVKyhuhxrCB5i6R:dW2YfEihw+lhEij0GVy4fq3ytwKpA5hY

Malware Config

Targets

    • Target

      game1 (6).zip

    • Size

      11.8MB

    • MD5

      395fc5195d25338573d12e09ef2152fb

    • SHA1

      43a5a013b7f1e4dfcbd746a1f63b0fd0ebeeae9a

    • SHA256

      91e7675364595193b02989591cdc5dd4775cb911caf67d462a94fa52c8e4504f

    • SHA512

      af7fea0858e873c724b56c22d174779979acdf9bd1413d8fd020aa3ebe873f0549e0785ee80970abaaf2ac13f1b62bbaa450fe27ed92676cd99d62199799601a

    • SSDEEP

      196608:dVSHrvfCYfxcvBr0hSQY+mwLJhEijn0tgvVeS4sM4fkj3ytwKpVKyhuhxrCB5i6R:dW2YfEihw+lhEij0GVy4fq3ytwKpA5hY

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Drops Chrome extension

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks