Resubmissions

26-04-2024 19:32

240426-x87d1aaf29 1

26-04-2024 19:30

240426-x723wsbd7v 8

26-04-2024 19:24

240426-x4h6lsbc8x 8

General

  • Target

    https://github.com/MalwareStudio?page=1&tab=repositories

  • Sample

    240426-x723wsbd7v

Score
8/10

Malware Config

Targets

    • Target

      https://github.com/MalwareStudio?page=1&tab=repositories

    Score
    8/10
    • Downloads MZ/PE file

    • Executes dropped EXE

    • Modifies system executable filetype association

    • Registers COM server for autorun

    • Legitimate hosting services abused for malware hosting/C2

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Privilege Escalation

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Discovery

System Information Discovery

3
T1082

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

Command and Control

Web Service

1
T1102

Tasks