Resubmissions

01-03-2023 15:25

230301-st168agc91 10

01-03-2023 15:18

230301-splkzagc8v 8

01-03-2023 15:14

230301-smj95agf83 8

General

  • Target

    ChatGPT

  • Size

    288KB

  • Sample

    230301-st168agc91

  • MD5

    b63cbb1a6d65b0519a945f8e2eb3c154

  • SHA1

    a855dea2f8b65cba410a89ebc6ddabcdbf0de14d

  • SHA256

    7042f150be2f0007b8cb09bdf84036dabae16daafb53cbae139e31d49f3edb4b

  • SHA512

    082ed4c5fdf2a171a41892ce3d58e15ec3454c47a24472b42bf45537d741a2d587a33ea02e5613c998118a7da1a5ddd8efd71d1afca81510e854a32726855b15

  • SSDEEP

    6144:5TRgFloWDuqJwtrBI38EY8qiy1v+m//Q1RJGRJRRJLRJ2/XBR8fgnIEFOUtDR6gq:1RgFloNtrBI38EY8qiy1v+m//Q1RJGR1

Malware Config

Targets

    • Target

      ChatGPT

    • Size

      288KB

    • MD5

      b63cbb1a6d65b0519a945f8e2eb3c154

    • SHA1

      a855dea2f8b65cba410a89ebc6ddabcdbf0de14d

    • SHA256

      7042f150be2f0007b8cb09bdf84036dabae16daafb53cbae139e31d49f3edb4b

    • SHA512

      082ed4c5fdf2a171a41892ce3d58e15ec3454c47a24472b42bf45537d741a2d587a33ea02e5613c998118a7da1a5ddd8efd71d1afca81510e854a32726855b15

    • SSDEEP

      6144:5TRgFloWDuqJwtrBI38EY8qiy1v+m//Q1RJGRJRRJLRJ2/XBR8fgnIEFOUtDR6gq:1RgFloNtrBI38EY8qiy1v+m//Q1RJGR1

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Downloads MZ/PE file

    • Modifies Installed Components in the registry

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Registers COM server for autorun

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Legitimate hosting services abused for malware hosting/C2

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

2
T1158

Registry Run Keys / Startup Folder

4
T1060

Browser Extensions

1
T1176

Defense Evasion

Hidden Files and Directories

2
T1158

Modify Registry

8
T1112

Discovery

Query Registry

6
T1012

System Information Discovery

7
T1082

Peripheral Device Discovery

2
T1120

Command and Control

Web Service

1
T1102

Tasks