General

  • Target

    usfive_20210721-104153

  • Size

    3KB

  • Sample

    210721-5866m5fwhe

  • MD5

    876cfa83c871bc2271cf0a6edfa83ca6

  • SHA1

    8167442ce336011ce497bbe979fb8ece5a8d3a91

  • SHA256

    2828e711f09ecf56ea9f8125361c7aa9301787d35eac993c1de86e24acfee49c

  • SHA512

    c56641934d1ecafa9f2483d4daeb4dbb0b38b1636e34aee0380d4daf537bfdf09509bb79de8e9657efc614dd03e8ca3fc37652d7a1cd8be34565948d16be4fbd

Malware Config

Targets

    • Target

      usfive_20210721-104153

    • Size

      3KB

    • MD5

      876cfa83c871bc2271cf0a6edfa83ca6

    • SHA1

      8167442ce336011ce497bbe979fb8ece5a8d3a91

    • SHA256

      2828e711f09ecf56ea9f8125361c7aa9301787d35eac993c1de86e24acfee49c

    • SHA512

      c56641934d1ecafa9f2483d4daeb4dbb0b38b1636e34aee0380d4daf537bfdf09509bb79de8e9657efc614dd03e8ca3fc37652d7a1cd8be34565948d16be4fbd

    • Lu0bot

      Lu0bot is a lightweight infostealer written in NodeJS.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Persistence

Hidden Files and Directories

1
T1158

Defense Evasion

File Permissions Modification

1
T1222

Hidden Files and Directories

1
T1158

Discovery

System Information Discovery

4
T1082

Query Registry

1
T1012

Process Discovery

1
T1057

Tasks