General

  • Target

    60b49fbfc3d98134fd35d9bfe45db96985947fdfd0be5221f9fb774a577fc07c

  • Size

    517KB

  • Sample

    220731-d5nypsfffm

  • MD5

    e07728f85c48f56645c2d2a4be8aacf5

  • SHA1

    a8345e02bce2075d53b091fb8c95bb052d8e5e7a

  • SHA256

    60b49fbfc3d98134fd35d9bfe45db96985947fdfd0be5221f9fb774a577fc07c

  • SHA512

    5bd1f958f485b3f38904cac1a21747b016f6c516a29bc57249264a946f79b169216fa0d52874168419ddf68c826f1b5ecf26691da4060dda878e4347a3a2bd4c

Malware Config

Targets

    • Target

      60b49fbfc3d98134fd35d9bfe45db96985947fdfd0be5221f9fb774a577fc07c

    • Size

      517KB

    • MD5

      e07728f85c48f56645c2d2a4be8aacf5

    • SHA1

      a8345e02bce2075d53b091fb8c95bb052d8e5e7a

    • SHA256

      60b49fbfc3d98134fd35d9bfe45db96985947fdfd0be5221f9fb774a577fc07c

    • SHA512

      5bd1f958f485b3f38904cac1a21747b016f6c516a29bc57249264a946f79b169216fa0d52874168419ddf68c826f1b5ecf26691da4060dda878e4347a3a2bd4c

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Registers COM server for autorun

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks