General

  • Target

    minkoexternal.rar

  • Size

    10.5MB

  • Sample

    241226-kqwhka1mey

  • MD5

    0123f5ddd618ad998c85ba8bc18cf62e

  • SHA1

    0158b710080b5cd4279d9a05fbe3aff0f9a435fa

  • SHA256

    3f999b73e1e8d1a2d50952370ab205d446b6021560e9934f5148b1cbfba5e3fd

  • SHA512

    f484b363e865fa1bae555815a5412b66ae5847778d28e11c17e7accfb9c7f9372ee4f013c9db729ed85e991abe21f635411b1f3935ec788222cf4da268aec497

  • SSDEEP

    196608:lOLz9eNW2oK1O5oRXtt+TjeeH8VfnG9Le5BuqxBgMzvtb/e4Rr/KLF:kBeNXoK1uot+GYMBJxBnzvJXpQ

Malware Config

Targets

    • Target

      Mapper.exe

    • Size

      3.0MB

    • MD5

      f360158f01156feddbcff28b19c2a305

    • SHA1

      d9fb6edd03401885f5fc81d0855461a8d4932414

    • SHA256

      6752bd7afba1d78337f63a53e81ff63bfb29efd3d9b9835985b2a9017fd0e0c1

    • SHA512

      12159a4ac831a1f6925544d1dee0e7a38aa789736f36b533103850c8201f8012e4fcd888d28400383a79e7ddf45526f85ca1189317739d595f7f24c80abf8e18

    • SSDEEP

      49152:CJFkF6AWVHSJQM54i/OtyynS0kM4d1s09qw7F8mQEY3dEH4BrU3ZbS9tsUADsYms:CJuzCS5j/t+73E1s0QTR3d6ruwjnmxm

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      build.exe

    • Size

      7.7MB

    • MD5

      6ac862f2a0c6944f957b3047c065cc37

    • SHA1

      718454d6429cd529d2447b3f9d7dae8a6322ca90

    • SHA256

      77f78f9b349a157bd4243efdb4d8d9826fad30609f82388f7c4af23092b12353

    • SHA512

      3b8408bc605ae79aaa7ec66d151039a0734cdae3838e8b92ac2ca75884564d15e86f22b865c42ec51fdab6ca3080b5f53316f7adba1abd7b1478fbd74837dca3

    • SSDEEP

      196608:YrD+kdBwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWM:450IHL7HmBYXrYoaUNv

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks