General

  • Target

    amazing-game

  • Size

    166B

  • Sample

    240415-xe8d7sdd67

  • MD5

    6d568e39fe8663d3ae49c4e9b19d4083

  • SHA1

    c95f2f2d725ca7d534d7d7945009a40fd4b48cca

  • SHA256

    5bb1c8a8390c284e9a4634c04eee34dfd08759d66d2b613b0631ab10e2f1f3d9

  • SHA512

    60664b24a6c95b11deeade478a4f41f8cf8532dc8338e2f5d27b6cadadd371bf86280a7ef4a7770b210711d89f3726c041cd14979ffecdbd1455d99723e362d0

Malware Config

Targets

    • Target

      amazing-game

    • Size

      166B

    • MD5

      6d568e39fe8663d3ae49c4e9b19d4083

    • SHA1

      c95f2f2d725ca7d534d7d7945009a40fd4b48cca

    • SHA256

      5bb1c8a8390c284e9a4634c04eee34dfd08759d66d2b613b0631ab10e2f1f3d9

    • SHA512

      60664b24a6c95b11deeade478a4f41f8cf8532dc8338e2f5d27b6cadadd371bf86280a7ef4a7770b210711d89f3726c041cd14979ffecdbd1455d99723e362d0

    • Epsilon Stealer

      Information stealer.

    • Enumerates VirtualBox registry keys

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Looks for VirtualBox Guest Additions in registry

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Looks for VMWare Tools registry key

    • Modifies Installed Components in the registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks