General
-
Target
prorat_v1.9.zip
-
Size
3.1MB
-
Sample
240415-cbd1zaed2x
-
MD5
58bba5a6c8cb5654a586c361886c739b
-
SHA1
193d2d37f9fe22a8d1dc618f31c4c843518c33ef
-
SHA256
092106302a786b6a726503c027a8aa8e68df31d4e81dce380033e45a04dd1e9b
-
SHA512
be8c467c589f0755db855c6217945067537c3f313cd72061d62ac5320c6d2621c2d192d509531e70e5017bd2a31cb1c41a2a38f0ebc201648607f1e35ffda79e
-
SSDEEP
49152:HLAGwQd7SqIuaicE3H4EzGLFaoJs1n6nLRHcDItp33mo/lIq96tehDHWSm:HLp9dh+EzH1n6FcDIT32wlhcY2/
Static task
static1
Malware Config
Targets
-
-
Target
prorat_v1.9.zip
-
Size
3.1MB
-
MD5
58bba5a6c8cb5654a586c361886c739b
-
SHA1
193d2d37f9fe22a8d1dc618f31c4c843518c33ef
-
SHA256
092106302a786b6a726503c027a8aa8e68df31d4e81dce380033e45a04dd1e9b
-
SHA512
be8c467c589f0755db855c6217945067537c3f313cd72061d62ac5320c6d2621c2d192d509531e70e5017bd2a31cb1c41a2a38f0ebc201648607f1e35ffda79e
-
SSDEEP
49152:HLAGwQd7SqIuaicE3H4EzGLFaoJs1n6nLRHcDItp33mo/lIq96tehDHWSm:HLp9dh+EzH1n6FcDIT32wlhcY2/
-
Adds autorun key to be loaded by Explorer.exe on startup
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Adds policy Run key to start application
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
Modifies Installed Components in the registry
-
Registers new Print Monitor
-
Sets file execution options in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Modifies WinLogon
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
8Registry Run Keys / Startup Folder
6Winlogon Helper DLL
2Browser Extensions
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
8Registry Run Keys / Startup Folder
6Winlogon Helper DLL
2Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Change Default File Association
1Defense Evasion
Modify Registry
15Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1