Resubmissions

24-01-2022 22:06

220124-11d92abbbr 10

24-01-2022 22:01

220124-1xkyeabafq 8

General

  • Target

    GesNot.Cliente-x64.exe

  • Size

    117.6MB

  • Sample

    220124-11d92abbbr

  • MD5

    f4994ee65467f3f2a609cb8ce76d5af1

  • SHA1

    24f354af217c20f8987b56d3b4efaeede0d85416

  • SHA256

    33e07c74828fbbae628aeb455f033918a570cdaf08090d5de99812ff03a230b3

  • SHA512

    80df4b2be2dcb532edc0b50931f3f92e3e07f29aa39263e338f7a58dea7ddbf8879b48698bb0cb2959a577835020a03a72ef1e5b4f504dcb8895fbd1299761e7

Malware Config

Targets

    • Target

      GesNot.Cliente-x64.exe

    • Size

      117.6MB

    • MD5

      f4994ee65467f3f2a609cb8ce76d5af1

    • SHA1

      24f354af217c20f8987b56d3b4efaeede0d85416

    • SHA256

      33e07c74828fbbae628aeb455f033918a570cdaf08090d5de99812ff03a230b3

    • SHA512

      80df4b2be2dcb532edc0b50931f3f92e3e07f29aa39263e338f7a58dea7ddbf8879b48698bb0cb2959a577835020a03a72ef1e5b4f504dcb8895fbd1299761e7

    • Registers COM server for autorun

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

4
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

4
T1082

Tasks