General

  • Target

    usfive_20210711-154344

  • Size

    3KB

  • Sample

    210711-4wvnrzfnjx

  • MD5

    15467567c301ef6ae8b98d4fafb6db67

  • SHA1

    9884574ad77b49580ab14047342b4580324cb6ee

  • SHA256

    9db5c02ac4e161369160fe13719a212e55377dd57ffc9f98b7141bce3b9df26c

  • SHA512

    5b3d68e59a908312a8e009d2b6ec4af06be67ee7a762d996ed914de9c00bf5edd57dd38f8eaac52bff5ff8a42e7760b7503b517c671bffc37bb55327b37382b1

Malware Config

Targets

    • Target

      usfive_20210711-154344

    • Size

      3KB

    • MD5

      15467567c301ef6ae8b98d4fafb6db67

    • SHA1

      9884574ad77b49580ab14047342b4580324cb6ee

    • SHA256

      9db5c02ac4e161369160fe13719a212e55377dd57ffc9f98b7141bce3b9df26c

    • SHA512

      5b3d68e59a908312a8e009d2b6ec4af06be67ee7a762d996ed914de9c00bf5edd57dd38f8eaac52bff5ff8a42e7760b7503b517c671bffc37bb55327b37382b1

    • Lu0bot

      Lu0bot is a lightweight infostealer written in NodeJS.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Persistence

Hidden Files and Directories

1
T1158

Defense Evasion

File Permissions Modification

1
T1222

Hidden Files and Directories

1
T1158

Discovery

System Information Discovery

4
T1082

Query Registry

1
T1012

Process Discovery

1
T1057

Tasks