Resubmissions

23/11/2023, 08:41

231123-klkv9sgg37 8

23/11/2023, 08:36

231123-kh3xnsgg27 8

General

  • Target

    beetle-cab.cab

  • Size

    12.5MB

  • Sample

    231123-klkv9sgg37

  • MD5

    6179e6dcdd9d0c1223a7dc76fc350e37

  • SHA1

    856799db415ba9ef398d489e29e093f132fdc0df

  • SHA256

    b5a91d9c0614412d975e2e2ce82d5aaa3453ed467bf011fdd1c8ae765d6c8c1c

  • SHA512

    68932db6fd20ca6844be729217cfd94f6e715d89e74290a400c94f87a30bb08c83eb254d3d0e5b38e90bbd84870a59d37756cffda707f25342d283c251dcfaf6

  • SSDEEP

    196608:dBR6ZkXHrtQbiY7YO0jJsmraB6vexQnwJSvu+lOdLpFlh6ENP5gxIlO:3R6iXH2ipjJsmr/eSWKyjlJNPiilO

Malware Config

Targets

    • Target

      beetle-cab/7za.dll

    • Size

      272KB

    • MD5

      b54e2dcd1a3d593ca0ae4cb71910710e

    • SHA1

      15ab00317b310a7a535684c7221e0eb6cde68ac2

    • SHA256

      d7f1224cc4afb90af3792dadfdf2f14bad4a19329ee0f3c87c111611aa36b7b1

    • SHA512

      1414fd599095c3afd4faa6cf56e2f00d9db4d80f460457e4e08734ee24ed852f74d5813b4e96091c330ba8dd2f998995233583bbf887eff1c89b924b09a3fcc0

    • SSDEEP

      6144:Ml7K/bZ3Xb4/e4BQSx65Pz6RjVM/oTO+T7KmdCUOHn:MRK/bi/ecx6gJVMgTOE7KAQ

    Score
    3/10
    • Target

      beetle-cab/7za.exe

    • Size

      796KB

    • MD5

      90aac6489f6b226bf7dc1adabfdb1259

    • SHA1

      c90c47b717b776922cdd09758d2b4212d9ae4911

    • SHA256

      ba7f3627715614d113c1e1cd7dd9d47e3402a1e8a7404043e08bc14939364549

    • SHA512

      befaa9b27dc11e226b00a651aa91cbfe1ec36127084d87d44b6cd8a5076e0a092a162059295d3fcd17abb6ea9adb3b703f3652ae558c2eef4e8932131397c12d

    • SSDEEP

      24576:HWdp+y7/ya3yc7tfBA6rDUzfKrBxEATB:up+fa3rLA6s+/

    Score
    1/10
    • Target

      beetle-cab/7zxa.dll

    • Size

      161KB

    • MD5

      72dcc77ba25ebc4984d959a78c8646d5

    • SHA1

      50347fcdb44426918d2eeafd5ff8ca9385fbbb0b

    • SHA256

      6b4888207c46c23d2d4e4eace8a2db01711692bc7d4bb93f3750bc41e91bb73c

    • SHA512

      1ff7c0027802e65d5d668f2c7d90b71d720c964e7da03c2a8dc8e0b8456bfa8658ca57de17e66a1ebaaef5bf0be1806188813e1da608b6861bc4d8b6a48f8876

    • SSDEEP

      3072:ifGI+bVn1rLT8VxY9ZcHwDLULRpqnhlGZcQU6aRg+NmVRmCHOtGgYckP:3eK7QwUqnT6aRfmVR5SYz

    Score
    3/10
    • Target

      beetle-cab/start.cmd

    • Size

      86B

    • MD5

      232ebf167ea35163ea69a1570be7b03e

    • SHA1

      b8bc8c8b3f9ebf83ec43244a934389bd98849a0a

    • SHA256

      030ee398e53caf0928e757162f3c7be7d593a59dde2795991ec7e4fd8e71f2e3

    • SHA512

      efe7d716b4c2553b1dc295271b1bb32fccf12e2b64e6de7adbf5f8284bdee1c3a92b5a227c46a6bff6c1298d2e7319b73b7a75651710cad84564f0c4ec4c917f

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Modifies Installed Components in the registry

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks