General

  • Target

    stager.exe

  • Size

    2.4MB

  • Sample

    240418-wskdvscb9y

  • MD5

    e6c0cadfde8b03d7a37a0c91833ed73c

  • SHA1

    fea0214ee731ce87943b4edfc25dba30fbed2878

  • SHA256

    a7b311c609b9fbf8539376a4aa7e1c7f881c5f9af2ac1b46b684674c4992b7f8

  • SHA512

    72b8d9685ac45edb3cfe5b51608298899ad0c07de87cf87367cca37d2562b1a4722c11a2478825a40e5030f04fcf1d97c3af2008ea5baca6f261df6f16d2ed91

  • SSDEEP

    49152:rNfnwiPJ5sDBjvC4ct0zAAwPy/pTBJv702sb:54QejwK/5BW

Malware Config

Targets

    • Target

      stager.exe

    • Size

      2.4MB

    • MD5

      e6c0cadfde8b03d7a37a0c91833ed73c

    • SHA1

      fea0214ee731ce87943b4edfc25dba30fbed2878

    • SHA256

      a7b311c609b9fbf8539376a4aa7e1c7f881c5f9af2ac1b46b684674c4992b7f8

    • SHA512

      72b8d9685ac45edb3cfe5b51608298899ad0c07de87cf87367cca37d2562b1a4722c11a2478825a40e5030f04fcf1d97c3af2008ea5baca6f261df6f16d2ed91

    • SSDEEP

      49152:rNfnwiPJ5sDBjvC4ct0zAAwPy/pTBJv702sb:54QejwK/5BW

    • Drops file in Drivers directory

    • Modifies Installed Components in the registry

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Detected potential entity reuse from brand microsoft.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Defense Evasion

Modify Registry

3
T1112

Discovery

Query Registry

6
T1012

System Information Discovery

6
T1082

Peripheral Device Discovery

2
T1120

Command and Control

Web Service

1
T1102

Tasks