General

  • Target

    IObit-Malware-Fighter-Setup.exe

  • Size

    62.4MB

  • Sample

    211029-qxhg6sddf7

  • MD5

    8a00ddfdbf2b45e5c09410e2a0e68713

  • SHA1

    361ad5834271774a94b9e3b8fd0b541bf5633a50

  • SHA256

    81c970c56bc0b97bb9a2c5a9f4f012aa2fb326cbaaf6c15955a210f639376a56

  • SHA512

    4faab5c5520c473128f0a4cbb04d90fc9ce52e92f75631986fdf8ee727eb0c57fafd65f3bc7fc4ca12a69e8f1065280f745bc5796831685f87e88d61caf6a3e2

Malware Config

Targets

    • Target

      IObit-Malware-Fighter-Setup.exe

    • Size

      62.4MB

    • MD5

      8a00ddfdbf2b45e5c09410e2a0e68713

    • SHA1

      361ad5834271774a94b9e3b8fd0b541bf5633a50

    • SHA256

      81c970c56bc0b97bb9a2c5a9f4f012aa2fb326cbaaf6c15955a210f639376a56

    • SHA512

      4faab5c5520c473128f0a4cbb04d90fc9ce52e92f75631986fdf8ee727eb0c57fafd65f3bc7fc4ca12a69e8f1065280f745bc5796831685f87e88d61caf6a3e2

    • Modifies system executable filetype association

    • Registers COM server for autorun

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Registry Run Keys / Startup Folder

2
T1060

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

5
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Tasks