Resubmissions

24-02-2024 22:11

240224-138lnagd71 7

24-02-2024 22:08

240224-12j7nsgd41 7

21-02-2024 02:15

240221-cp3lgshf4t 7

21-02-2024 01:57

240221-cdsl5saa36 10

21-02-2024 01:53

240221-ca5gjahh86 7

General

  • Target

    Myau-240105-cracked (1).jar

  • Size

    1.6MB

  • Sample

    240221-cdsl5saa36

  • MD5

    9115e3db16b63fb1a254f3bd57ad5893

  • SHA1

    9c32dfffb1582ad8df15f4464b0a246d81b06f48

  • SHA256

    e79735e48a7cdaaf0f91cffda247eea8a4bbebaf39aebccad54f4cf23b5e7f8a

  • SHA512

    9b6481c30f5a58cdfca9d1702e059a46dfcdcb5773f1f6ef7d324050f287bd503159f316e7b0cedc2fe396326fd9e57685627c8257f4248e5057c0bbac78f77d

  • SSDEEP

    24576:V96G/x8Z/QUTbjvgizYcftFdGmDAhQW3ZV2gDSGuGqZBXOYS8flT6lqYI:V9xxOBPrgGfDfDAKW3ZV2FLbZBeNYB

Malware Config

Targets

    • Target

      Myau-240105-cracked (1).jar

    • Size

      1.6MB

    • MD5

      9115e3db16b63fb1a254f3bd57ad5893

    • SHA1

      9c32dfffb1582ad8df15f4464b0a246d81b06f48

    • SHA256

      e79735e48a7cdaaf0f91cffda247eea8a4bbebaf39aebccad54f4cf23b5e7f8a

    • SHA512

      9b6481c30f5a58cdfca9d1702e059a46dfcdcb5773f1f6ef7d324050f287bd503159f316e7b0cedc2fe396326fd9e57685627c8257f4248e5057c0bbac78f77d

    • SSDEEP

      24576:V96G/x8Z/QUTbjvgizYcftFdGmDAhQW3ZV2gDSGuGqZBXOYS8flT6lqYI:V9xxOBPrgGfDfDAKW3ZV2FLbZBeNYB

    • Chimera

      Ransomware which infects local and network files, often distributed via Dropbox links.

    • Chimera Ransomware Loader DLL

      Drops/unpacks executable file which resembles Chimera's Loader.dll.

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Renames multiple (3381) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Disables Task Manager via registry modification

    • Downloads MZ/PE file

    • Modifies Installed Components in the registry

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Modifies WinLogon

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks