General

  • Target

    game1 (1).zip

  • Size

    11.7MB

  • Sample

    230512-qw33gsfe2t

  • MD5

    946eb7e0ed68317ade2c1808d85ad34c

  • SHA1

    fb5664f5f404c2c70d4a317e02b39f6d7d11f638

  • SHA256

    d083d6441107b6a36d7965eadfd28bc8468bd1bdb2078a2a6700bfb98894531b

  • SHA512

    9c31e99522fe8fa8565cf7fe6e035dbd21496601ed47820bab9bb711c78f8dbcfde2917cf9c9e9c1685ecfd9033ad00949786c3c3618765910b7873b5407bdd9

  • SSDEEP

    196608:mFzxc8Fl3sS+b8yZla5W6oFCwmPAdQCowQUb7sT12IjSsQd5zvuqKPkfRH7H6gKT:uRR6fl0IFu5w9HspJusm5qv8JHWgKT

Malware Config

Targets

    • Target

      game1 (1).zip

    • Size

      11.7MB

    • MD5

      946eb7e0ed68317ade2c1808d85ad34c

    • SHA1

      fb5664f5f404c2c70d4a317e02b39f6d7d11f638

    • SHA256

      d083d6441107b6a36d7965eadfd28bc8468bd1bdb2078a2a6700bfb98894531b

    • SHA512

      9c31e99522fe8fa8565cf7fe6e035dbd21496601ed47820bab9bb711c78f8dbcfde2917cf9c9e9c1685ecfd9033ad00949786c3c3618765910b7873b5407bdd9

    • SSDEEP

      196608:mFzxc8Fl3sS+b8yZla5W6oFCwmPAdQCowQUb7sT12IjSsQd5zvuqKPkfRH7H6gKT:uRR6fl0IFu5w9HspJusm5qv8JHWgKT

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Drops Chrome extension

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks