General

  • Target

    ee40188bacd94177daf9d87ae44b9c31.bin

  • Size

    2.9MB

  • Sample

    231121-dvvnhace5z

  • MD5

    95c324d056161bbbbcb118f13835976e

  • SHA1

    a84cf26962a3cbdba90274d714ac994a856b7def

  • SHA256

    d6ab7fe967076db39ead3285fd303dd3df4ed8d79d2a63666feb9d5c0a2d119a

  • SHA512

    79a87dc1a370d47da3695349c18aabf8e9f083a3c1711e0e8477ce29ba8afc37192b73627a9e5767bad066e70006f47ee542c42b03913f75e4167c2b68e7d57a

  • SSDEEP

    49152:Jk8ZdfMgkQLjOiyFLHWDxTiRuwaVCbMxq+AmZROLQGeKSlNSdRdnT8edMjX4AtKL:zd7vCLH4TO82oqkdGeKGSNT16jX4AtKL

Malware Config

Targets

    • Target

      13a7e8de46706c0921cfe6e10d0a8dad139c1dcfb78c7ed6b635bc90821d0d4f.exe

    • Size

      3.0MB

    • MD5

      ee40188bacd94177daf9d87ae44b9c31

    • SHA1

      96c43fd4c818d545bb2322c4a2ea5f3671a6d86a

    • SHA256

      13a7e8de46706c0921cfe6e10d0a8dad139c1dcfb78c7ed6b635bc90821d0d4f

    • SHA512

      506274fc0f81bd132876286dd9a56ce3fee2ef455c724a9389b52b11e99bc1b0fd4514ccda5f4fedd331862f15f27d5347442db8a21e81b77979f7d4c5f66541

    • SSDEEP

      49152:cl09kS3mE0w9UCregO8V6duBGJivPtGT+1uP+DspG5MxHoH+SN9PIU:cl09x2IuCre4V6duBGitTLsQMxIH+iIU

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks