Resubmissions

14/01/2024, 23:44

240114-3rb5eseeg5 9

14/01/2024, 23:43

240114-3qyl2aeeg4 9

General

  • Target

    Phoenix.exe

  • Size

    12.7MB

  • Sample

    240114-3rb5eseeg5

  • MD5

    e056732708932298e6ca11194fcb7ced

  • SHA1

    b8e89a5eef747df459697bd0ed33680967310ad9

  • SHA256

    cdc44464eb15e5903283de24e314aa1917d0b4850e584ecb800b211e4a0c1ee8

  • SHA512

    668f57fe8bcf68465e5845b1d4a7c9166bad092caacc9ee47758e3a091ddafadfca462cdacc8eb4aeabe2220140128e8c79120d9ca5e4500b5bd041f1fc2d25d

  • SSDEEP

    196608:xEmzYCjmWIbhTiXz0qx+cUG4raKu24YY7HVT4hV0AD6QgqKRgX:mTCjSNTiD0XmKr4YYH+EUWpgX

Malware Config

Targets

    • Target

      Phoenix.exe

    • Size

      12.7MB

    • MD5

      e056732708932298e6ca11194fcb7ced

    • SHA1

      b8e89a5eef747df459697bd0ed33680967310ad9

    • SHA256

      cdc44464eb15e5903283de24e314aa1917d0b4850e584ecb800b211e4a0c1ee8

    • SHA512

      668f57fe8bcf68465e5845b1d4a7c9166bad092caacc9ee47758e3a091ddafadfca462cdacc8eb4aeabe2220140128e8c79120d9ca5e4500b5bd041f1fc2d25d

    • SSDEEP

      196608:xEmzYCjmWIbhTiXz0qx+cUG4raKu24YY7HVT4hV0AD6QgqKRgX:mTCjSNTiD0XmKr4YYH+EUWpgX

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks