General

  • Target

    189c4d80-41f7-4b71-8d0c-75630293bca7.zip

  • Size

    5.4MB

  • Sample

    210507-55cflbwvhe

  • MD5

    36b9720592988cf49d5f2eb1ee2dd1eb

  • SHA1

    0ca0904c0bf8aa63cdbb68a4b87a4381e3c24d6d

  • SHA256

    970253f12e332e4e36537198556cdefe1ba6ae7c20be6482d5fe33f366cd6af2

  • SHA512

    8a51a1a2f194c7f95fb2fe085cbd152955f64d7a81a169e8331427daaa8f6ace3e78415e8c18f04e7da902020a3d248f5e247a7421b9ab68495eebd540cf8f13

Malware Config

Targets

    • Target

      DRP_15.9_Full/Tools/modules/bugreport/SysInfo.exe

    • Size

      5.5MB

    • MD5

      ffc1771da2961a16f68670262aeac3b9

    • SHA1

      ada0cfb2fe7e8097373510be273d5e9443b1936e

    • SHA256

      1a24d8cdc38765e6d5d98a6a9351f5d102d7db45d507f4ee05e85893eb305922

    • SHA512

      2575a75eb42b1b56d43e9e6bb5c6428b3efcef566d05c70917c7c6195e2f410d1c3665dd05d0e5035578a7d4972b4962c50aa48f916e7b869000834f3901102c

    • Registers COM server for autorun

    • Nirsoft

    • Drops file in Drivers directory

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Discovery

Query Registry

7
T1012

System Information Discovery

7
T1082

Peripheral Device Discovery

3
T1120

Tasks