General

  • Target

    5e882b13cd9f9201b23848fbff442f69

  • Size

    1.1MB

  • Sample

    231222-efgnrsbghp

  • MD5

    5e882b13cd9f9201b23848fbff442f69

  • SHA1

    e29afbab857f4d256e711f030d9aef6fa508dc71

  • SHA256

    1a7e443892523689b6c4e599d1b2350523186e7dc205b0e1d60af751d205a1ad

  • SHA512

    4e48db23df04a89d156856c1a3573c0a5626c51eb80bbc870f92ff276b7a3923d5c15f06d96ab167668bf130ed2f906bb5f901cb74bd4b596278bdb7e397f0c8

  • SSDEEP

    12288:EZG5oK3jni/3yKuvM/kuina4mIqhkfCMXWjnd9szKOhISbP19khBs3U0fqamFAMw:EYri/ijv6uXb3CGSBFlLOcJBLjoIo

Malware Config

Targets

    • Target

      5e882b13cd9f9201b23848fbff442f69

    • Size

      1.1MB

    • MD5

      5e882b13cd9f9201b23848fbff442f69

    • SHA1

      e29afbab857f4d256e711f030d9aef6fa508dc71

    • SHA256

      1a7e443892523689b6c4e599d1b2350523186e7dc205b0e1d60af751d205a1ad

    • SHA512

      4e48db23df04a89d156856c1a3573c0a5626c51eb80bbc870f92ff276b7a3923d5c15f06d96ab167668bf130ed2f906bb5f901cb74bd4b596278bdb7e397f0c8

    • SSDEEP

      12288:EZG5oK3jni/3yKuvM/kuina4mIqhkfCMXWjnd9szKOhISbP19khBs3U0fqamFAMw:EYri/ijv6uXb3CGSBFlLOcJBLjoIo

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks