General

  • Target

    Trusteer.zip

  • Size

    3.3MB

  • Sample

    240901-1dp31sshna

  • MD5

    e901a3d2239142f7a3a5d93320ffcff1

  • SHA1

    c33eac1862db3611730d62c688430c235feaefe4

  • SHA256

    b3b3a4a9ac1cc6715d8c875ac34f92708d0b9f91104b793768ed90baa57c97d0

  • SHA512

    2e9187e3af506e6311e284fe2a26b5711e7c99425e80a3e1dd7fdb435ba9297298988a715bafc950cfe7071d035f54ed36b2cbfeb17e201eb3a3620e256a582f

  • SSDEEP

    98304:YcS/hHOGLVlQtM2xOxWwyvfOUe+sz2oIjx2hA2Z1IrJMy:YvZdswW1mU7sz2oAG0rJMy

Malware Config

Targets

    • Target

      Trusteer.exe

    • Size

      3.3MB

    • MD5

      30cb49e14aa0f3247110df5dc1a1690b

    • SHA1

      84521809033b25b01338e3087881d4c37b4d0faa

    • SHA256

      2ad801c4a4f232b02c940858d69c3d3608c6df1606b73c76494e1d7d0d30e761

    • SHA512

      c206045d0c2ba0dfc773bb5b41db0802127d86d521b6fe41523d63e59b79a2657dd960b3ca1dc1be31298279d920f3080a5e72803cd11fe261b32e08cd3577e9

    • SSDEEP

      49152:p7RUQh1V1fO/9DA0q3i9aLrsvHyR15U8dJAsgWpyTulz9b9H5vDCjeMeZi7uax:p711TMeS92r1155A/0ysPZvej3

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Tor communications

      Malware can proxy its traffic through Tor for more anonymity.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks