Resubmissions

22-10-2020 07:32

201022-1j7wkgsyn6 7

22-10-2020 06:23

201022-cxcnhy84b2 10

General

  • Target

    Christmas Shipment 102120208586_PDF.exe

  • Size

    349KB

  • Sample

    201022-cxcnhy84b2

  • MD5

    d83e43d9071e4db4af3cb776b5ec020c

  • SHA1

    d4a4e658b5658901e62a17ae85cf15ec8051cad3

  • SHA256

    3dd49a4c4138beb588bd295bdf95af66f5d4779cb1d70731a3702dd08c794d66

  • SHA512

    f3aa967c4d7ad1294968b8e4e94ca51f171ecd003bb7709f9da006e4acdda8b8a40fdf3219b69afac7bbbb3cc0cd0198ce5978b75d8387b02f510bcb5e6fbf22

Malware Config

Targets

    • Target

      Christmas Shipment 102120208586_PDF.exe

    • Size

      349KB

    • MD5

      d83e43d9071e4db4af3cb776b5ec020c

    • SHA1

      d4a4e658b5658901e62a17ae85cf15ec8051cad3

    • SHA256

      3dd49a4c4138beb588bd295bdf95af66f5d4779cb1d70731a3702dd08c794d66

    • SHA512

      f3aa967c4d7ad1294968b8e4e94ca51f171ecd003bb7709f9da006e4acdda8b8a40fdf3219b69afac7bbbb3cc0cd0198ce5978b75d8387b02f510bcb5e6fbf22

    • HiveRAT

      HiveRAT is an improved version of FirebirdRAT with various capabilities.

    • Beds Protector Packer

      Detects Beds Protector packer used to load .NET malware.

    • HiveRAT Payload

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks