General

  • Target

    60ff1ff227903adf83707a10175d93e241cfa777f99a2df229cf33cb9240d699

  • Size

    7.7MB

  • Sample

    240615-145w6awgjd

  • MD5

    5b0da2986d8126c685d56dc0d9e8dad5

  • SHA1

    c0628d0b8443a90f73ee58f16eb1ad2ab8aaf772

  • SHA256

    60ff1ff227903adf83707a10175d93e241cfa777f99a2df229cf33cb9240d699

  • SHA512

    f9e3f10e86607b607e0a37c106d0aa2864d7b81586ac4bd235fa85d2be031297bc2941593a4de9e8c268b8728075ac2bbc9af17d71f8e2104b61de961d9289dc

  • SSDEEP

    196608:qEnsnPt8wA6qas/UbVIblRpU3eTcfWPLZdxcno4lxTG:uP6v6rs26pUALPLZdxcnJ

Malware Config

Targets

    • Target

      60ff1ff227903adf83707a10175d93e241cfa777f99a2df229cf33cb9240d699

    • Size

      7.7MB

    • MD5

      5b0da2986d8126c685d56dc0d9e8dad5

    • SHA1

      c0628d0b8443a90f73ee58f16eb1ad2ab8aaf772

    • SHA256

      60ff1ff227903adf83707a10175d93e241cfa777f99a2df229cf33cb9240d699

    • SHA512

      f9e3f10e86607b607e0a37c106d0aa2864d7b81586ac4bd235fa85d2be031297bc2941593a4de9e8c268b8728075ac2bbc9af17d71f8e2104b61de961d9289dc

    • SSDEEP

      196608:qEnsnPt8wA6qas/UbVIblRpU3eTcfWPLZdxcno4lxTG:uP6v6rs26pUALPLZdxcnJ

    • Detect Poverty Stealer Payload

    • Poverty Stealer

      Poverty Stealer is a crypto and infostealer written in C++.

    • Detects executables packed with Themida

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks