General

  • Target

    ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03

  • Size

    235KB

  • Sample

    220228-dqgwvadaa5

  • MD5

    247951ff7b519fa8d39ef07d33e0ba5b

  • SHA1

    cf4587b6015d2a00c26a369339504595a266401f

  • SHA256

    ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03

  • SHA512

    6185aeae2dbb154ba4fef27eb7dc71a1e6a8ba7e1ca69cbbe5aeb9588b29d95608e32e9f46f8d60183584903f3bbffbd5a603f5717a84f18ad81bb5088ee7bd7

Malware Config

Targets

    • Target

      ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03

    • Size

      235KB

    • MD5

      247951ff7b519fa8d39ef07d33e0ba5b

    • SHA1

      cf4587b6015d2a00c26a369339504595a266401f

    • SHA256

      ec3c0afccfef11f753a408c859d98bbba4841e87f7f1a48573270c0d82252b03

    • SHA512

      6185aeae2dbb154ba4fef27eb7dc71a1e6a8ba7e1ca69cbbe5aeb9588b29d95608e32e9f46f8d60183584903f3bbffbd5a603f5717a84f18ad81bb5088ee7bd7

    • SaintBot

      Saint Bot is a malware dropper being used to deliver secondary payloads such as information stealers.

    • SaintBot Payload

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks