General

  • Target

    https://www.bing.com/ck/a?!&&p=a36d64fd534a99cdJmltdHM9MTY5ODc5NjgwMCZpZ3VpZD0yMDUxNTkwMy04Yjk5LTYxYTgtMTFhNS00YWFhOGFmZTYwZWMmaW5zaWQ9NTIwOA&ptn=3&hsh=3&fclid=20515903-8b99-61a8-11a5-4aaa8afe60ec&psq=github+usbstealer&u=a1aHR0cHM6Ly9naXRodWIuY29tL210cHMzL1VTQlN0ZWFsZXI&ntb=1

  • Sample

    231101-z8pkasfa64

Score
9/10

Malware Config

Targets

    • Target

      https://www.bing.com/ck/a?!&&p=a36d64fd534a99cdJmltdHM9MTY5ODc5NjgwMCZpZ3VpZD0yMDUxNTkwMy04Yjk5LTYxYTgtMTFhNS00YWFhOGFmZTYwZWMmaW5zaWQ9NTIwOA&ptn=3&hsh=3&fclid=20515903-8b99-61a8-11a5-4aaa8afe60ec&psq=github+usbstealer&u=a1aHR0cHM6Ly9naXRodWIuY29tL210cHMzL1VTQlN0ZWFsZXI&ntb=1

    Score
    9/10
    • Nirsoft

    • Drops file in Drivers directory

    • Sets service image path in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks