General

  • Target

    c66dae5fe5a7550df3c3cb51bdf3235e7c16c54c9fedb385af59887a48134d1f

  • Size

    125KB

  • Sample

    240410-reb34sad57

  • MD5

    ec1f0609cb23e09d481d6e17713ee76e

  • SHA1

    3141cbacf3146c9c273b7d3ec0454494f67ff7a4

  • SHA256

    c66dae5fe5a7550df3c3cb51bdf3235e7c16c54c9fedb385af59887a48134d1f

  • SHA512

    c30cc818da37dff69184442abf155cc4f3b0a0f8cc34d79fb0729244d2c00c3163f0922f5366370a7e3c3544d91323aedf985cc6dcbc2b06d5b2d34089f913ff

  • SSDEEP

    3072:qhwUekmWWQXXkH7TdAGyau5ljOPBbzeDkn1:FUekmWy7ZAGyapPBb6O

Malware Config

Targets

    • Target

      Update-AV.exe

    • Size

      223KB

    • MD5

      893b17ed65ecffa8376063349f22d2bc

    • SHA1

      50c556277899d6b9da5ec125c0a58650a14a08a7

    • SHA256

      ebbf30e06de3a25f76cf43c72c521d14a27053e4d9be566b41f50c41bea3a7a9

    • SHA512

      e61a215547991592a204868a979ec513198a6ba192a692a97ccba352c427dc1721a433c0aaaa98107f2d91ae5d2b0aad57ea9ea86ca48a0d61b8a48ecef6b787

    • SSDEEP

      3072:EwA6vAcT6agXrIISqRIYrCNrACDJi7kX9ne6uDxj5AiOhtSvLt2b:6cT6PXrI/qRIZrACGkX9niILtUt2b

    • SaintBot

      Saint Bot is a malware dropper being used to deliver secondary payloads such as information stealers.

    • SaintBot payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks