General

  • Target

    KayZer.exe

  • Size

    6.0MB

  • Sample

    241231-rs7ryaxjdp

  • MD5

    7988a817d0491d1cd117c2557a984697

  • SHA1

    d8d5581e2480ea04a7840bc787981ab52a7e81ae

  • SHA256

    3689a3d591ab4d7a7861ba1445aba8707da08011e01d34828858ffecbe775f49

  • SHA512

    dc429315e8138dd5fcf44b136b1f6ebd5865f563cb15a24ce41ecd37620dcf23c12cc7901ffa8ca4f21848bb052ec9c1919149383c8778cb6dbbdd3714e0a158

  • SSDEEP

    98304:Bn0yk8bSv0M9j7ktyYxyLmu5LLGXdof+AHRk8A+OTLpyX92jxDwpsGVjI24:Wj9jYp3N8+AvOsAjGpsmjI2

Malware Config

Targets

    • Target

      KayZer.exe

    • Size

      6.0MB

    • MD5

      7988a817d0491d1cd117c2557a984697

    • SHA1

      d8d5581e2480ea04a7840bc787981ab52a7e81ae

    • SHA256

      3689a3d591ab4d7a7861ba1445aba8707da08011e01d34828858ffecbe775f49

    • SHA512

      dc429315e8138dd5fcf44b136b1f6ebd5865f563cb15a24ce41ecd37620dcf23c12cc7901ffa8ca4f21848bb052ec9c1919149383c8778cb6dbbdd3714e0a158

    • SSDEEP

      98304:Bn0yk8bSv0M9j7ktyYxyLmu5LLGXdof+AHRk8A+OTLpyX92jxDwpsGVjI24:Wj9jYp3N8+AvOsAjGpsmjI2

    • ElysiumStealer

      ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.

    • ElysiumStealer Support DLL

    • Elysiumstealer family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks