Resubmissions

27/11/2024, 09:59 UTC

241127-l1hj5aynbt 10

22/06/2023, 05:40 UTC

230622-gcwdvsdh9z 10

General

  • Target

    file.exe

  • Size

    448KB

  • Sample

    230622-gcwdvsdh9z

  • MD5

    f5a4e48c469d899bf882475b36dff8d9

  • SHA1

    b1845ec95f2837038461a04dc266bcb48a052fcb

  • SHA256

    d850df618ed03fd518cb4c52bb09657a2eda865702a0498b965b0279ea73b362

  • SHA512

    8be14d34d360537a82532b8172d5ad4c257ac703f0ecbc021871d521723ff942101ba84c53ccbd3148808f2f7a3748bd478e7e1e89cb53e1d95a32907b81b003

  • SSDEEP

    6144:L/E8DIpjK28t4snQxlp3z/pSZ+pDKpf9EkQbKxVK+PXItNOapG8RuzRiRh3Zi:dEpj7snqv/cgu4VGn6OaM+ucj

Malware Config

Targets

    • Target

      file.exe

    • Size

      448KB

    • MD5

      f5a4e48c469d899bf882475b36dff8d9

    • SHA1

      b1845ec95f2837038461a04dc266bcb48a052fcb

    • SHA256

      d850df618ed03fd518cb4c52bb09657a2eda865702a0498b965b0279ea73b362

    • SHA512

      8be14d34d360537a82532b8172d5ad4c257ac703f0ecbc021871d521723ff942101ba84c53ccbd3148808f2f7a3748bd478e7e1e89cb53e1d95a32907b81b003

    • SSDEEP

      6144:L/E8DIpjK28t4snQxlp3z/pSZ+pDKpf9EkQbKxVK+PXItNOapG8RuzRiRh3Zi:dEpj7snqv/cgu4VGn6OaM+ucj

    • Detect rhadamanthys stealer shellcode

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • XMRig Miner payload

    • Drops file in Drivers directory

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.