General

  • Target

    ca6b1afe76cbc6f14e10608b426d7c6c028ab78de5cca30ae7b5880710865171

  • Size

    783KB

  • Sample

    220524-3ld2tsbgd8

  • MD5

    af453e6dc8439e4856260859e7d68fc1

  • SHA1

    031520acf4961f5938f0ceeb2f02e2656667cffb

  • SHA256

    ca6b1afe76cbc6f14e10608b426d7c6c028ab78de5cca30ae7b5880710865171

  • SHA512

    434afe14ea03edb8988ca23785275a63f8398936811f0b86215c1f4b3f165fc0da352e01aa16206e6f28bf93dee4c0ec21882b08b35adedb55052d7fb54136e3

Malware Config

Targets

    • Target

      ca6b1afe76cbc6f14e10608b426d7c6c028ab78de5cca30ae7b5880710865171

    • Size

      783KB

    • MD5

      af453e6dc8439e4856260859e7d68fc1

    • SHA1

      031520acf4961f5938f0ceeb2f02e2656667cffb

    • SHA256

      ca6b1afe76cbc6f14e10608b426d7c6c028ab78de5cca30ae7b5880710865171

    • SHA512

      434afe14ea03edb8988ca23785275a63f8398936811f0b86215c1f4b3f165fc0da352e01aa16206e6f28bf93dee4c0ec21882b08b35adedb55052d7fb54136e3

    • HiveRAT

      HiveRAT is an improved version of FirebirdRAT with various capabilities.

    • Modifies WinLogon for persistence

    • Modifies Windows Defender Real-time Protection settings

    • HiveRAT Payload

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Windows security modification

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks