General

  • Target

    feb8add569247306cb0271c907607238

  • Size

    348KB

  • Sample

    220114-pyhnwsgbh5

  • MD5

    feb8add569247306cb0271c907607238

  • SHA1

    bb9353d602a82ff174afe7574f4afd6009e2a8b0

  • SHA256

    e7587776adecf859e137e7af3da4b9b6fd9428e6f89cc48d3a63886d490baaca

  • SHA512

    6f650a1d44a11b2205e59dc915e244ac43988c7ac32972280cc5c5ca1ed668b683c2b06f61aef8d2e91ce1c83fc4e0788207023b6ca81372acdb4935f0402689

Malware Config

Targets

    • Target

      feb8add569247306cb0271c907607238

    • Size

      348KB

    • MD5

      feb8add569247306cb0271c907607238

    • SHA1

      bb9353d602a82ff174afe7574f4afd6009e2a8b0

    • SHA256

      e7587776adecf859e137e7af3da4b9b6fd9428e6f89cc48d3a63886d490baaca

    • SHA512

      6f650a1d44a11b2205e59dc915e244ac43988c7ac32972280cc5c5ca1ed668b683c2b06f61aef8d2e91ce1c83fc4e0788207023b6ca81372acdb4935f0402689

    • LoaderBot

      LoaderBot is a loader written in .NET downloading and executing miners.

    • LoaderBot executable

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks