General

  • Target

    Client.exe

  • Size

    4.1MB

  • Sample

    240625-fygxxsscra

  • MD5

    6739b48a36b2608c5326f124db06bcb3

  • SHA1

    b6adddecfb69b7652f363060aeaec79586ab17f9

  • SHA256

    384ffec47a0a4278444b6d27fc893621643dbedbf76715b892625765c65a72ec

  • SHA512

    477ab4321b6143de4c88f306585573a70a7cf87150d267369ad33be33a38a3eb5f3b18d3bf92d934b98616bbaf441340d808d612ca6240cd7bb85fae3a476eab

  • SSDEEP

    98304:guWzWlWTDZL9Itk77iU/7PCfprx4oKMuk2jv+dXf0:gdfTDZL9sk77yN9u9raXf0

Malware Config

Targets

    • Target

      Client.exe

    • Size

      4.1MB

    • MD5

      6739b48a36b2608c5326f124db06bcb3

    • SHA1

      b6adddecfb69b7652f363060aeaec79586ab17f9

    • SHA256

      384ffec47a0a4278444b6d27fc893621643dbedbf76715b892625765c65a72ec

    • SHA512

      477ab4321b6143de4c88f306585573a70a7cf87150d267369ad33be33a38a3eb5f3b18d3bf92d934b98616bbaf441340d808d612ca6240cd7bb85fae3a476eab

    • SSDEEP

      98304:guWzWlWTDZL9Itk77iU/7PCfprx4oKMuk2jv+dXf0:gdfTDZL9sk77yN9u9raXf0

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks