General

  • Target

    8fb7e071f7176a17dafadf82be9fd8f69a327729.rl.zip

  • Size

    3.0MB

  • Sample

    220517-nnjmrsbca8

  • MD5

    81c8b7e94ba100f73c27840e70c9faa6

  • SHA1

    9b95cea9f3307b39ad77ceac5cdb9ac80b27d381

  • SHA256

    8015fd56cd4385490ff681f9cff279125c9ab8ae9dea8209428949d1d5c08af8

  • SHA512

    0e0e9fc17b5eb4f187e5878e3f6bbb3b3eeca3227019b0d01a4c1422c0635b87fd0b78275fd7e939af28488cbda2eb2074178eadafbde562060cd767e57135ec

Malware Config

Targets

    • Target

      8fb7e071f7176a17dafadf82be9fd8f69a327729.rl

    • Size

      4.0MB

    • MD5

      6a23eb71a9d38bb41d260439e66b9089

    • SHA1

      8fb7e071f7176a17dafadf82be9fd8f69a327729

    • SHA256

      b634a8041412c63c42bbc10264b4c70b6a84d8aeb01a7d75d89731bb551835ac

    • SHA512

      195ce37bd24541f6584d23d48d2a79e4ab157f78f4c947f006aa2566e3a8a0351319e3cb1788eba79932d21a526035b6f1ba4943a6abc3a4bff66fe8d3691532

    • Modifies security service

    • Modifies system executable filetype association

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Registers COM server for autorun

    • Checks for common network interception software

      Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

    • Enumerates VirtualBox registry keys

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Modifies boot configuration data using bcdedit

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Change Default File Association

1
T1042

Registry Run Keys / Startup Folder

4
T1060

Browser Extensions

1
T1176

Bootkit

1
T1067

Defense Evasion

Modify Registry

8
T1112

Virtualization/Sandbox Evasion

2
T1497

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Software Discovery

1
T1518

Query Registry

9
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

8
T1082

Security Software Discovery

1
T1063

Peripheral Device Discovery

2
T1120

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

1
T1490

Tasks