General

  • Target

    5abdb8b16f503976c3e726521c1f93b927931c00

  • Size

    211KB

  • Sample

    191018-xssrgacz7s

  • MD5

    8ceea38088eba219be2db883cbb0ded6

  • SHA1

    5abdb8b16f503976c3e726521c1f93b927931c00

  • SHA256

    12ea4b688f33a5448c08c52d09b6e993b9ee293d09ba673c567c7a6d1ec7b94c

  • SHA512

    686549c1dd8a94feba048b4714ae5f9177395d00a2622bd30c1a9ede0f1bc9de6a322775c38f5ea258d94d6abea29bfed71c39d2b72baae102eee95a256e89e6

Score
10/10

Malware Config

Extracted

Family

ursnif

Botnet

1000

C2

http://alister-mathmatics.club

rsa_pubkey.base64
serpent.plain

Targets

    • Target

      5abdb8b16f503976c3e726521c1f93b927931c00

    • Size

      211KB

    • MD5

      8ceea38088eba219be2db883cbb0ded6

    • SHA1

      5abdb8b16f503976c3e726521c1f93b927931c00

    • SHA256

      12ea4b688f33a5448c08c52d09b6e993b9ee293d09ba673c567c7a6d1ec7b94c

    • SHA512

      686549c1dd8a94feba048b4714ae5f9177395d00a2622bd30c1a9ede0f1bc9de6a322775c38f5ea258d94d6abea29bfed71c39d2b72baae102eee95a256e89e6

    Score
    10/10
    • ursnif family

    • Windows security modification

    • Checks system information in the registry (likely anti-VM)

    • Modifies service

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

3
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks