General

  • Target

    krutilka.exe

  • Size

    284KB

  • Sample

    230513-2t2bnaca7t

  • MD5

    9b7c249034a5e5ab4f3cdd45c42bf65f

  • SHA1

    dd803910c9b65427bd658c859cc8b5a3bb5ffc2c

  • SHA256

    60292e6be9d0d5e5f82a3382e4b69fcd19362b4c30a1829787dfc6ea5462a117

  • SHA512

    a1948fe2afdb67937bc90f915bf877cba8984b9883c23a677c2022197516bc88465e4c52adc0a88850723c2c3439c07007aff3e29c1beebe7fbf7510ac7b6d20

  • SSDEEP

    6144:IekEbFTBhqoJe4ixZVhXD7OsMq8Q2k9vlc0HvMziZ:IcBhqx4ixjhT8qj2k9i8vM2Z

Malware Config

Targets

    • Target

      krutilka.exe

    • Size

      284KB

    • MD5

      9b7c249034a5e5ab4f3cdd45c42bf65f

    • SHA1

      dd803910c9b65427bd658c859cc8b5a3bb5ffc2c

    • SHA256

      60292e6be9d0d5e5f82a3382e4b69fcd19362b4c30a1829787dfc6ea5462a117

    • SHA512

      a1948fe2afdb67937bc90f915bf877cba8984b9883c23a677c2022197516bc88465e4c52adc0a88850723c2c3439c07007aff3e29c1beebe7fbf7510ac7b6d20

    • SSDEEP

      6144:IekEbFTBhqoJe4ixZVhXD7OsMq8Q2k9vlc0HvMziZ:IcBhqx4ixjhT8qj2k9i8vM2Z

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Change Default File Association

1
T1042

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks