General

  • Target

    Malicious77c1933c4311390d.exe

  • Size

    68KB

  • Sample

    230704-scpf4aeb97

  • MD5

    c0549318d1ebd8400dffafb37839126e

  • SHA1

    95e2529d80809a529ed1bc67d7e4a20a4cc74b88

  • SHA256

    77c1933c4311390d9131d1d962138379902158c4cb9a40dd1458ba53565b28f9

  • SHA512

    61021ea63df51a89b2a1c6c2de62491639cccac322395e402fce3cf8da2c83dc04a9b5a6072ed5925baa9586d4deab51d627e036174bd3790eff9f434a8d48d0

  • SSDEEP

    1536:cCTKEPvB2z1qeFU6IOOUMM513zIjGWvhqooGBO3FZ8BbiUeJ:hMBN+MTzKzvghKBbYJ

Malware Config

Targets

    • Target

      Malicious77c1933c4311390d.exe

    • Size

      68KB

    • MD5

      c0549318d1ebd8400dffafb37839126e

    • SHA1

      95e2529d80809a529ed1bc67d7e4a20a4cc74b88

    • SHA256

      77c1933c4311390d9131d1d962138379902158c4cb9a40dd1458ba53565b28f9

    • SHA512

      61021ea63df51a89b2a1c6c2de62491639cccac322395e402fce3cf8da2c83dc04a9b5a6072ed5925baa9586d4deab51d627e036174bd3790eff9f434a8d48d0

    • SSDEEP

      1536:cCTKEPvB2z1qeFU6IOOUMM513zIjGWvhqooGBO3FZ8BbiUeJ:hMBN+MTzKzvghKBbYJ

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks