General

  • Target

    FOLHAS-PAGINAS-ADVOCACIA.msi

  • Size

    2.8MB

  • Sample

    210923-qwvq4sedep

  • MD5

    8446fedeadab37c667b02dd7e0fdac26

  • SHA1

    04e9d8f6301946ae9a9fef977a5424f722fd9435

  • SHA256

    f01cc28590e94c1af30ca919a93f2615285f6774f5fc6b7cd8f933fac3303203

  • SHA512

    bfad67c71ac19a608cf03f93c18adb6d8073cc1deba149e8c0763a851c29de4a27064e36fb7a32bc5ffa82af3d45723d4ae34250f21526ef1853d92ef5362df1

Malware Config

Targets

    • Target

      FOLHAS-PAGINAS-ADVOCACIA.msi

    • Size

      2.8MB

    • MD5

      8446fedeadab37c667b02dd7e0fdac26

    • SHA1

      04e9d8f6301946ae9a9fef977a5424f722fd9435

    • SHA256

      f01cc28590e94c1af30ca919a93f2615285f6774f5fc6b7cd8f933fac3303203

    • SHA512

      bfad67c71ac19a608cf03f93c18adb6d8073cc1deba149e8c0763a851c29de4a27064e36fb7a32bc5ffa82af3d45723d4ae34250f21526ef1853d92ef5362df1

    • Detect Numando Payload

    • Numando

      Numando is a banking trojan/backdoor targeting Latin America which uses Youtube and Pastebin for C2 communications.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks