General

  • Target

    https://cdn.discordapp.com/attachments/1255278764032659466/1282423283752632452/steamapplicationupdater.exe?ex=66e29901&is=66e14781&hm=465f85149581167384db216ee91d19d1792df55a667d789ef9654d2da27badf5&

  • Sample

    240911-n5p6wayfpl

Malware Config

Targets

    • Target

      https://cdn.discordapp.com/attachments/1255278764032659466/1282423283752632452/steamapplicationupdater.exe?ex=66e29901&is=66e14781&hm=465f85149581167384db216ee91d19d1792df55a667d789ef9654d2da27badf5&

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • ElysiumStealer

      ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.

    • ElysiumStealer Support DLL

    • AgentTesla payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Looks for VirtualBox Guest Additions in registry

    • Downloads MZ/PE file

    • Looks for VMWare Tools registry key

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks