General

  • Target

    5263f286e45a03c8309fc8bb49e0f19a.exe

  • Size

    349KB

  • Sample

    220112-hw34gsbfdm

  • MD5

    5263f286e45a03c8309fc8bb49e0f19a

  • SHA1

    a351cbd1c56f74115473c831442588653351231d

  • SHA256

    83ae57bdc0f817111ab909f54ec0f33b84f6504596d2a55adf39a16c5cf1afc0

  • SHA512

    e00f2adb5bdf172d73006a0d813fa4fdaf60f1900297a43393e9efc7c1187747e62babf6ff9ddafd019ecf306184b94fb1332313f00037f8dce447c41159c4f3

Malware Config

Targets

    • Target

      5263f286e45a03c8309fc8bb49e0f19a.exe

    • Size

      349KB

    • MD5

      5263f286e45a03c8309fc8bb49e0f19a

    • SHA1

      a351cbd1c56f74115473c831442588653351231d

    • SHA256

      83ae57bdc0f817111ab909f54ec0f33b84f6504596d2a55adf39a16c5cf1afc0

    • SHA512

      e00f2adb5bdf172d73006a0d813fa4fdaf60f1900297a43393e9efc7c1187747e62babf6ff9ddafd019ecf306184b94fb1332313f00037f8dce447c41159c4f3

    • LoaderBot

      LoaderBot is a loader written in .NET downloading and executing miners.

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • LoaderBot executable

    • mimikatz is an open source tool to dump credentials on Windows

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks