General

  • Target

    TeamViewer_Setup.exe

  • Size

    167KB

  • Sample

    230717-va1gpaec6z

  • MD5

    e9b22671e6d12b6e916ba894ac226db6

  • SHA1

    81b6798f8f3168d65a114906dc0613bbedb0a51f

  • SHA256

    3ba0993bd95aa81f72ad13fa9cfb2304f715bebe4a486b688d6b1252e8f67d44

  • SHA512

    7d29251d77cbe813d0d414377e8d09438e3d457b12ed9d03898f7fa5c1a3538ff4407bb962ff033a665244b182c828126c62f5f1917155ce81001f9835208b42

  • SSDEEP

    3072:vJZKnPE2YyJzELtyTFyYeY8lNgoiJ+sX8HFvytbCNIR6kqOJTMMz+:vJZKBI0FyYeY4eoiJ+sCFvRSHbz+

Malware Config

Targets

    • Target

      TeamViewer_Setup.exe

    • Size

      167KB

    • MD5

      e9b22671e6d12b6e916ba894ac226db6

    • SHA1

      81b6798f8f3168d65a114906dc0613bbedb0a51f

    • SHA256

      3ba0993bd95aa81f72ad13fa9cfb2304f715bebe4a486b688d6b1252e8f67d44

    • SHA512

      7d29251d77cbe813d0d414377e8d09438e3d457b12ed9d03898f7fa5c1a3538ff4407bb962ff033a665244b182c828126c62f5f1917155ce81001f9835208b42

    • SSDEEP

      3072:vJZKnPE2YyJzELtyTFyYeY8lNgoiJ+sX8HFvytbCNIR6kqOJTMMz+:vJZKBI0FyYeY4eoiJ+sCFvRSHbz+

    • VanillaRat

      VanillaRat is an advanced remote administration tool coded in C#.

    • Vanilla Rat payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

2
T1012

Command and Control

Web Service

1
T1102

Tasks