General

  • Target

    FromEnergyBadx64.msi

  • Size

    2.5MB

  • Sample

    230821-bcdwxsaa79

  • MD5

    0a4f0faa78975c74260efbd859ac6282

  • SHA1

    1df3d05c9847f7efc3dad5b8d31c48cff0ee69e2

  • SHA256

    2e0f093aec2db43730e2b9e50e0156b7f69f9f30f7b744927ed95efa7f84ec2a

  • SHA512

    ffaa480dc0ad2d4c5dc810efd03723fa7488298d364e06bbb273bb54f31d75f0caf00bcf37ab578374cf41b94689831a42a83124f908937b34859cb97a7c96eb

  • SSDEEP

    49152:qVcMDa1y97n0d33BL8oeQjq6owuLpvKjjIcc5xPlBb7/nSej8ARI43AHsHoQD2w:Eckaod0dBL8Gq6owJIjbI43hR

Malware Config

Targets

    • Target

      FromEnergyBadx64.msi

    • Size

      2.5MB

    • MD5

      0a4f0faa78975c74260efbd859ac6282

    • SHA1

      1df3d05c9847f7efc3dad5b8d31c48cff0ee69e2

    • SHA256

      2e0f093aec2db43730e2b9e50e0156b7f69f9f30f7b744927ed95efa7f84ec2a

    • SHA512

      ffaa480dc0ad2d4c5dc810efd03723fa7488298d364e06bbb273bb54f31d75f0caf00bcf37ab578374cf41b94689831a42a83124f908937b34859cb97a7c96eb

    • SSDEEP

      49152:qVcMDa1y97n0d33BL8oeQjq6owuLpvKjjIcc5xPlBb7/nSej8ARI43AHsHoQD2w:Eckaod0dBL8Gq6owJIjbI43hR

    • Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Modifies Installed Components in the registry

    • Sets file execution options in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

3
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

3
T1547.001

Defense Evasion

Modify Registry

2
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks