General

  • Target

    usfive_20210804-120800

  • Size

    2KB

  • Sample

    210804-pwbge2japn

  • MD5

    ae597b5df58ab4f01867bb5eaac93efd

  • SHA1

    c8a13f566a130f18507e824e1e5c167b186a65a7

  • SHA256

    a565b1d26d7c7ea28aad5f1c23fb5c055198d200147589c7dc36e3e1fa13e119

  • SHA512

    fd978db8ff6d1fc7625ec996938022d3e191a5b58d7dcd0a430f80e1558f4986aaaeff2cc57f0d21451905d24494f7c5581b349e2d75d28a77e5430309f13afa

Malware Config

Targets

    • Target

      usfive_20210804-120800

    • Size

      2KB

    • MD5

      ae597b5df58ab4f01867bb5eaac93efd

    • SHA1

      c8a13f566a130f18507e824e1e5c167b186a65a7

    • SHA256

      a565b1d26d7c7ea28aad5f1c23fb5c055198d200147589c7dc36e3e1fa13e119

    • SHA512

      fd978db8ff6d1fc7625ec996938022d3e191a5b58d7dcd0a430f80e1558f4986aaaeff2cc57f0d21451905d24494f7c5581b349e2d75d28a77e5430309f13afa

    • Lu0bot

      Lu0bot is a lightweight infostealer written in NodeJS.

    • suricata: ET MALWARE lu0bot Loader HTTP Request

    • suricata: ET MALWARE lu0bot Loader HTTP Response

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Persistence

Hidden Files and Directories

1
T1158

Defense Evasion

File Permissions Modification

1
T1222

Hidden Files and Directories

1
T1158

Discovery

System Information Discovery

4
T1082

Query Registry

1
T1012

Process Discovery

1
T1057

Tasks