General

  • Target

    https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbmlNNXpENmE1MTZ2YkhfYUx2WHRYVUN3dGZ0d3xBQ3Jtc0trTmxVRjNHNUFiRG9XejFnN3BxeDJvWU9MR3pWcWw5Rm1TMmtHY3RpQlR2REEyR0lCVFo0SzZJN3RzdWFTeGxxcWxoYWFKaEtNZDlFaUFJcnhYS1I5dUVvenBYbThUYzRadVhnWTJVVEtQVHhDLW8xUQ&q=https%3A%2F%2Fgithub.com%2Fdisepi%2Fambrosial%2Freleases&v=39EDt22qW5s

  • Sample

    230307-2jvq5ace78

Score
8/10

Malware Config

Targets

    • Target

      https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbmlNNXpENmE1MTZ2YkhfYUx2WHRYVUN3dGZ0d3xBQ3Jtc0trTmxVRjNHNUFiRG9XejFnN3BxeDJvWU9MR3pWcWw5Rm1TMmtHY3RpQlR2REEyR0lCVFo0SzZJN3RzdWFTeGxxcWxoYWFKaEtNZDlFaUFJcnhYS1I5dUVvenBYbThUYzRadVhnWTJVVEtQVHhDLW8xUQ&q=https%3A%2F%2Fgithub.com%2Fdisepi%2Fambrosial%2Freleases&v=39EDt22qW5s

    Score
    8/10
    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks