General

  • Target

    mm2_script.exe

  • Size

    779.0MB

  • Sample

    240525-yzfqcsgg9x

  • MD5

    046cb8524f5b4dbcc9ab33a4efa3b0a9

  • SHA1

    1942141f2935fd99a82455170e44bc76f7e30372

  • SHA256

    8e546b234527478f0cbe882fa647c385b7f2079fbd036ac029d1c9bba088cebe

  • SHA512

    35369d25359d2e129263cfb053f8bbe5896721452ae3ddba20559305f98f2668d6bb80a77d503aa5ae78e2d4e266a4d9b0dab4fe3ccd92b37eee6e55d9989616

  • SSDEEP

    196608:JX4EsBB8WwgTgUoRxe+2l4YX5Lc1QJgxoTJGEs:9ylwgxHNlqDE

Malware Config

Extracted

Family

stealc

rc4.plain

Targets

    • Target

      mm2_script.exe

    • Size

      779.0MB

    • MD5

      046cb8524f5b4dbcc9ab33a4efa3b0a9

    • SHA1

      1942141f2935fd99a82455170e44bc76f7e30372

    • SHA256

      8e546b234527478f0cbe882fa647c385b7f2079fbd036ac029d1c9bba088cebe

    • SHA512

      35369d25359d2e129263cfb053f8bbe5896721452ae3ddba20559305f98f2668d6bb80a77d503aa5ae78e2d4e266a4d9b0dab4fe3ccd92b37eee6e55d9989616

    • SSDEEP

      196608:JX4EsBB8WwgTgUoRxe+2l4YX5Lc1QJgxoTJGEs:9ylwgxHNlqDE

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

3
T1552

Credentials In Files

3
T1552.001

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

4
T1082

Collection

Data from Local System

3
T1005

Tasks