General

  • Target

    usfive_20210804-182856

  • Size

    2KB

  • Sample

    210804-1z9p7ffs2s

  • MD5

    ab9ae54ca49cf5f6065af27e779b4653

  • SHA1

    c39d0558a7135e24b8293f3330a3ba0e663d7422

  • SHA256

    d58184d02343b1ee6bf6f5c8146233288caa4f9a1543990b4c0e20be74fb671e

  • SHA512

    7dd40b5100bf35bf45b346ae9508b3bb1e6f3ac7d457fb99f9bbcbae78e1e9809b527afb86805954688c7fc6b7093c87d456fa947cb0857b18716238b6a116ad

Malware Config

Targets

    • Target

      usfive_20210804-182856

    • Size

      2KB

    • MD5

      ab9ae54ca49cf5f6065af27e779b4653

    • SHA1

      c39d0558a7135e24b8293f3330a3ba0e663d7422

    • SHA256

      d58184d02343b1ee6bf6f5c8146233288caa4f9a1543990b4c0e20be74fb671e

    • SHA512

      7dd40b5100bf35bf45b346ae9508b3bb1e6f3ac7d457fb99f9bbcbae78e1e9809b527afb86805954688c7fc6b7093c87d456fa947cb0857b18716238b6a116ad

    • Lu0bot

      Lu0bot is a lightweight infostealer written in NodeJS.

    • suricata: ET MALWARE lu0bot Loader HTTP Request

    • suricata: ET MALWARE lu0bot Loader HTTP Response

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Persistence

Hidden Files and Directories

1
T1158

Defense Evasion

File Permissions Modification

1
T1222

Hidden Files and Directories

1
T1158

Discovery

System Information Discovery

4
T1082

Query Registry

1
T1012

Process Discovery

1
T1057

Tasks