General

  • Target

    50d95caf72714020836b397fbbbb75e01a5732114bcd51aeae9e36d12b93ed58

  • Size

    876KB

  • Sample

    220310-xb7cqsaba2

  • MD5

    c56f66280de5fe29f75e72525ac54fe1

  • SHA1

    79928f9c7ed0cea9850bf98db365ee59371399e3

  • SHA256

    50d95caf72714020836b397fbbbb75e01a5732114bcd51aeae9e36d12b93ed58

  • SHA512

    f65bdfd1e58440ed6febb95b07d5a8e9afafe28a322ae78fa79228be5a9ae48e6064c8d304d8008eb4d3b8d468a5c9f1162dd1e0eb47d43daa018dee864b995e

Malware Config

Targets

    • Target

      50d95caf72714020836b397fbbbb75e01a5732114bcd51aeae9e36d12b93ed58

    • Size

      876KB

    • MD5

      c56f66280de5fe29f75e72525ac54fe1

    • SHA1

      79928f9c7ed0cea9850bf98db365ee59371399e3

    • SHA256

      50d95caf72714020836b397fbbbb75e01a5732114bcd51aeae9e36d12b93ed58

    • SHA512

      f65bdfd1e58440ed6febb95b07d5a8e9afafe28a322ae78fa79228be5a9ae48e6064c8d304d8008eb4d3b8d468a5c9f1162dd1e0eb47d43daa018dee864b995e

    • SaintBot

      Saint Bot is a malware dropper being used to deliver secondary payloads such as information stealers.

    • SaintBot Payload

    • Nirsoft

    • Executes dropped EXE

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks