General

  • Target

    TRDKXFp3.bat

  • Size

    197B

  • Sample

    200402-95haj95jqj

  • MD5

    9727c80f12d3336f330b3688e052968e

  • SHA1

    a20e98c967b46f66b2c7ebb51739ea41636b7f79

  • SHA256

    352f20fc1f8b8354ab0f610f5fdb66c11e24d56ba92f323df35200a0939ba674

  • SHA512

    faf8e17c7858c3163621f74dc918b491b591c9f99c9351d904b4653be79148e9495ad07e94f82a56506e132fbb4b256fdd36b1da0659fad778ef36369ee12bd6

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/TRDKXFp3

Targets

    • Target

      TRDKXFp3.bat

    • Size

      197B

    • MD5

      9727c80f12d3336f330b3688e052968e

    • SHA1

      a20e98c967b46f66b2c7ebb51739ea41636b7f79

    • SHA256

      352f20fc1f8b8354ab0f610f5fdb66c11e24d56ba92f323df35200a0939ba674

    • SHA512

      faf8e17c7858c3163621f74dc918b491b591c9f99c9351d904b4653be79148e9495ad07e94f82a56506e132fbb4b256fdd36b1da0659fad778ef36369ee12bd6

    • Blacklisted process makes network request

    • Program crash

    • Discovering connected drives

    • Modifies system certificate store

    • Drops file in System32 directory

    • Modifies service

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

3
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Impact

Defacement

1
T1491

Tasks