General

  • Target

    setup.exe

  • Size

    146KB

  • Sample

    241118-vw8eessakk

  • MD5

    15ac5ad1c4c1a483da074a5fad3f4b0c

  • SHA1

    144d87b60d42a0b5d527b3cab8cd7ad60d3c468c

  • SHA256

    d87bc6b532f94b6023c55bb38f96f0472857bb7742db4199704386bf8f533fb9

  • SHA512

    4dacb7551ccc17cb552ad12a0308f2d0c6ff3a27e5a079767b094db7daf54dbf2886273f7da6cd84d73d33a861aae8f1b35d0f52b3ee1db0913854181411a4de

  • SSDEEP

    3072:4ESJuC4+3BrDDl8DC+1iJLU0YFzkEDN3BtGc/aFRsO8Jw:+uCBRrDZN+1i2xCmRwc/a7j

Score
10/10

Malware Config

Targets

    • Target

      setup.exe

    • Size

      146KB

    • MD5

      15ac5ad1c4c1a483da074a5fad3f4b0c

    • SHA1

      144d87b60d42a0b5d527b3cab8cd7ad60d3c468c

    • SHA256

      d87bc6b532f94b6023c55bb38f96f0472857bb7742db4199704386bf8f533fb9

    • SHA512

      4dacb7551ccc17cb552ad12a0308f2d0c6ff3a27e5a079767b094db7daf54dbf2886273f7da6cd84d73d33a861aae8f1b35d0f52b3ee1db0913854181411a4de

    • SSDEEP

      3072:4ESJuC4+3BrDDl8DC+1iJLU0YFzkEDN3BtGc/aFRsO8Jw:+uCBRrDZN+1i2xCmRwc/a7j

    Score
    10/10
    • VenomRAT

      Detects VenomRAT.

    • Venomrat family

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks