General

  • Target

    https://cdn.discordapp.com/attachments/1270183574250852484/1270414113440534579/Mapper.exe?ex=66b39cd7&is=66b24b57&hm=d3d389f0b221de8964522b1afa9f7adf5d928f2f3c62dc6b04e100cf2160f443&

  • Sample

    240806-vnc9bavbrr

Malware Config

Targets

    • Target

      https://cdn.discordapp.com/attachments/1270183574250852484/1270414113440534579/Mapper.exe?ex=66b39cd7&is=66b24b57&hm=d3d389f0b221de8964522b1afa9f7adf5d928f2f3c62dc6b04e100cf2160f443&

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks