Resubmissions

28/08/2023, 12:18

230828-pgk3padf7w 8

28/08/2023, 12:14

230828-petxtaag73 1

28/08/2023, 12:07

230828-pafvdsdf5x 8

28/08/2023, 12:05

230828-n9m73sdf5t 1

General

  • Target

    https://zelenka.guru/proxy.php?link=http%3A%2F%2Fcloudanex.com%2Ffile%2F13084ce&hash=0c784c69fed2854bab93e11d2547b332

  • Sample

    230828-pgk3padf7w

Malware Config

Targets

    • Target

      https://zelenka.guru/proxy.php?link=http%3A%2F%2Fcloudanex.com%2Ffile%2F13084ce&hash=0c784c69fed2854bab93e11d2547b332

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Drops Chrome extension

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks