Resubmissions

02-12-2021 12:25

211202-plxbhsbcd7 10

01-12-2021 20:47

211201-zk4pbabab6 8

01-12-2021 17:08

211201-vnszrsebek 10

26-11-2021 21:11

211126-z1qsdsabg9 10

24-11-2021 20:39

211124-zfk2eagha8 10

16-11-2021 05:27

211116-f5hg2acdg7 8

15-11-2021 06:03

211115-gshspsecdp 8

15-11-2021 05:57

211115-gnkfqseccr 8

15-11-2021 05:56

211115-gm6btahcg8 8

14-11-2021 21:12

211114-z2d5zsdgfq 8

General

  • Target

    DiscordSetup.exe

  • Size

    79.1MB

  • Sample

    211201-vnszrsebek

  • MD5

    3d99554cc8bdd96ab58483a21d821740

  • SHA1

    85389db7e48c563d77cbef27e2f5724cbef4a151

  • SHA256

    c6bd3da755f382466610ed96d363e701cf044819b925684896af26b797abaa6d

  • SHA512

    be063484581b219ae27f6f515901bde14d03fa76adfe1bd33b9174a5551c719e09946548cd5acae0b5204dd21e6e349707cb06225a6d640a542eb15ec8aae183

Malware Config

Targets

    • Target

      DiscordSetup.exe

    • Size

      79.1MB

    • MD5

      3d99554cc8bdd96ab58483a21d821740

    • SHA1

      85389db7e48c563d77cbef27e2f5724cbef4a151

    • SHA256

      c6bd3da755f382466610ed96d363e701cf044819b925684896af26b797abaa6d

    • SHA512

      be063484581b219ae27f6f515901bde14d03fa76adfe1bd33b9174a5551c719e09946548cd5acae0b5204dd21e6e349707cb06225a6d640a542eb15ec8aae183

    • Registers COM server for autorun

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Sets file execution options in registry

    • Sets service image path in registry

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

5
T1060

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

9
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

4
T1012

System Information Discovery

5
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks