General

  • Target

    keyi1.zip

  • Size

    93.6MB

  • Sample

    241221-r1tkaa1nbv

  • MD5

    6ae3059b73a1e222739683abd6715800

  • SHA1

    86df186b69e5a9ce9cd194dbb430442148c78c2e

  • SHA256

    b1cc45e42cbf1f530f02d3334beaa591dca557e4fa64a43024b0223f800d55d9

  • SHA512

    139b86d6739fb01631f9aaf437bde80383dfa67010f5d7fd23111f4d8048d4fa2fb32c0709fcae1c4d4e36fe90040ae6d273d755d15276b4bb3b41cffeeb0c9f

  • SSDEEP

    1572864:v0whg2VaDZcejhSEQrqOaxM1BZ829PCfCpVFZgEDyzB2WybRvkR1O4n3Se:v22YDZcetSEQrqBxMLZF9KQZjDyzB2WB

Malware Config

Targets

    • Target

      111/360Safe+338511+n6bf58e0f9e.exe

    • Size

      94.2MB

    • MD5

      1c85a9c4c105f309b0fafdac3179cd14

    • SHA1

      da377b7b625b50c5d1bb88923bd49d5f9f392c9b

    • SHA256

      4b467317023c8e489c02c77e18022420f8bef1ce5e2e99c7668d336d047bcf0a

    • SHA512

      08f57d6a3cb150f75d833f5cd015e8e25fafeaee4f729b8d834937943f2db3c4e4c8bc8492da8aef73ea3394fb6904214c68edab9a865a6bb3d8987603307e2c

    • SSDEEP

      1572864:H5m6ZDSq2SFdBzc9g3m+6dEQaWQqoZDKI0QE4czB6imbiS79aQJsG6sw:cKSq2mdBagW+6dRmoN61d9UGfw

    • Modifies security service

    • Checks for common network interception software

      Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

    • Enumerates VirtualBox registry keys

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Modifies boot configuration data using bcdedit

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops file in Drivers directory

    • Looks for VMWare services registry key.

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks