Resubmissions

10-07-2021 16:53

210710-thekp6z3ka 10

10-07-2021 16:51

210710-yc1gf34hxn 8

General

  • Target

    dd.exe

  • Size

    82.1MB

  • Sample

    210710-thekp6z3ka

  • MD5

    9b5aaf2bfe25d830f482b5516471aea3

  • SHA1

    442c40f4dd466a643595a40ae1239c89fca6f9ae

  • SHA256

    9de171005e8191a70274184c61dcac5e75b6a4307063c740609209da86592f3c

  • SHA512

    508322b9d26d55f291d6511103b15dffd9c2230599d51f28c63dfdf9ff6d494a6240fa7daa1b354a051524ea888da6b7b8f03420c4c209ffa734328c10c10b42

Malware Config

Targets

    • Target

      dd.exe

    • Size

      82.1MB

    • MD5

      9b5aaf2bfe25d830f482b5516471aea3

    • SHA1

      442c40f4dd466a643595a40ae1239c89fca6f9ae

    • SHA256

      9de171005e8191a70274184c61dcac5e75b6a4307063c740609209da86592f3c

    • SHA512

      508322b9d26d55f291d6511103b15dffd9c2230599d51f28c63dfdf9ff6d494a6240fa7daa1b354a051524ea888da6b7b8f03420c4c209ffa734328c10c10b42

    • Registers COM server for autorun

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Modifies file permissions

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Browser Extensions

1
T1176

Defense Evasion

File Permissions Modification

1
T1222

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Tasks