General
-
Target
GAMESENSEI-CRACKED-2040.exe
-
Size
20.1MB
-
Sample
240719-1l7m2a1erl
-
MD5
9eb5feba62a901025adef7c2ee90b21c
-
SHA1
be54f5c7535709b8a7af748bc6a8b978f44a814c
-
SHA256
d37a4f4ed23694b8a3edf29098970976895b6c47245a783f9c315b4afb578499
-
SHA512
7532bb04e44dd20953141eb71c2930942b7e757fab78f391d8bcaa011655bd69fb78f4cb8e38e6e0c625be2863540f0665e500aadcfa57914a961de578939163
-
SSDEEP
393216:QqkSmYlSLpLFG0zW0zkV8GP870Qj3+thpvLpTWwim72/kpW8wxU:1SLBz1ABUj3+vpvLpTLim7KiQ
Behavioral task
behavioral1
Sample
GAMESENSEI-CRACKED-2040.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
GAMESENSEI-CRACKED-2040.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1262051087750266910/KhxR_xNjdZvGVJls5o320QK8BdbAvI7ZuNwsyA_FlunAuLOHTdv-7jBqFYmwtMJp6w8f
Targets
-
-
Target
GAMESENSEI-CRACKED-2040.exe
-
Size
20.1MB
-
MD5
9eb5feba62a901025adef7c2ee90b21c
-
SHA1
be54f5c7535709b8a7af748bc6a8b978f44a814c
-
SHA256
d37a4f4ed23694b8a3edf29098970976895b6c47245a783f9c315b4afb578499
-
SHA512
7532bb04e44dd20953141eb71c2930942b7e757fab78f391d8bcaa011655bd69fb78f4cb8e38e6e0c625be2863540f0665e500aadcfa57914a961de578939163
-
SSDEEP
393216:QqkSmYlSLpLFG0zW0zkV8GP870Qj3+thpvLpTWwim72/kpW8wxU:1SLBz1ABUj3+vpvLpTLim7KiQ
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Pre-OS Boot
1Bootkit
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Virtualization/Sandbox Evasion
1Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Modify Registry
1