General
-
Target
Surtr.exe
-
Size
383KB
-
Sample
220121-dt7axadbbn
-
MD5
709fedc6247f6c7a93dd570e15010dbe
-
SHA1
a3b061339364f053f521c894b0d5f08516fee493
-
SHA256
267fa786176679a2d99bf4d47cbcd8591640452ff393af7d61cfd5c0d8e67f33
-
SHA512
b6379dc973322b4e46fb79c5b88de30a763fe373cb5381e9d64b6ea56e33a6bb95529e970a53770337a3373efe48a766b9663421e901225da2fe6d1e245d118c
Static task
static1
Behavioral task
behavioral1
Sample
Surtr.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
Surtr.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\ProgramData\Service\SURTR_README.txt
Extracted
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\SURTR_README.hta
surtr
Extracted
C:\ProgramData\Service\SURTR_README.txt
Extracted
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\SURTR_README.hta
surtr
Targets
-
-
Target
Surtr.exe
-
Size
383KB
-
MD5
709fedc6247f6c7a93dd570e15010dbe
-
SHA1
a3b061339364f053f521c894b0d5f08516fee493
-
SHA256
267fa786176679a2d99bf4d47cbcd8591640452ff393af7d61cfd5c0d8e67f33
-
SHA512
b6379dc973322b4e46fb79c5b88de30a763fe373cb5381e9d64b6ea56e33a6bb95529e970a53770337a3373efe48a766b9663421e901225da2fe6d1e245d118c
-
Detects Surtr Payload
-
Clears Windows event logs
-
Modifies boot configuration data using bcdedit
-
Disables Task Manager via registry modification
-
Disables use of System Restore points
-
Sets service image path in registry
-
Drops startup file
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
1Registry Run Keys / Startup Folder
2Scheduled Task
1Defense Evasion
Bypass User Account Control
1Disabling Security Tools
1File Deletion
2Hidden Files and Directories
1Indicator Removal on Host
1Modify Registry
5