General

  • Target

    Rgssexe.exe

  • Size

    507KB

  • Sample

    230629-tv7k3afb2t

  • MD5

    7f6e2a0959481ac955ffa5c591a1e25e

  • SHA1

    02ce117dc8c9b08e381aaccf102766f436166597

  • SHA256

    4781b5ca739a280c011844dabab8fb008340ad82efa70486edc34e8de8a10946

  • SHA512

    928ccaaf714cdbe7fa60925d5b8f351ef9d2ea080047e3bc5678975c50d3ec5fd74c371279aca0980704f38324b832b4236811aab2ae93598884f61a9ac32d88

  • SSDEEP

    12288:9FKBG73lOUG2H7zS8zjDMpOltJJCSJEM1oPa7XK:BrlMa7zbzPMWJJVv11a

Malware Config

Targets

    • Target

      Rgssexe.exe

    • Size

      507KB

    • MD5

      7f6e2a0959481ac955ffa5c591a1e25e

    • SHA1

      02ce117dc8c9b08e381aaccf102766f436166597

    • SHA256

      4781b5ca739a280c011844dabab8fb008340ad82efa70486edc34e8de8a10946

    • SHA512

      928ccaaf714cdbe7fa60925d5b8f351ef9d2ea080047e3bc5678975c50d3ec5fd74c371279aca0980704f38324b832b4236811aab2ae93598884f61a9ac32d88

    • SSDEEP

      12288:9FKBG73lOUG2H7zS8zjDMpOltJJCSJEM1oPa7XK:BrlMa7zbzPMWJJVv11a

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Checks QEMU agent file

      Checks presence of QEMU agent, possibly to detect virtualization.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks