General

  • Target

    https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbmk3cWlqNVVudk1rS3NzVVVMVkJDVlBMeEJ4QXxBQ3Jtc0tucWxKMlpCZmhFazE3ejV2eWI4WERLc1l2U0RUNklHdExFY21rVFBCbU52OFBUVE1tSWVidUpmTmZkN2tQalloZmVubWgwMElfelctSlBTeWNPdEc0N3l1RnJuZ3FrSWZHMW5pODR1Y2todERkZUhtUQ&q=https%3A%2F%2Fmega.nz%2Ffolder%2Ft7FCFJpS%23L_mWwsUnQJwFYbAQyEetIQ&v=oWKjnP6BKXw

  • Sample

    240509-m1tg3adh5w

Score
8/10

Malware Config

Targets

    • Target

      https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbmk3cWlqNVVudk1rS3NzVVVMVkJDVlBMeEJ4QXxBQ3Jtc0tucWxKMlpCZmhFazE3ejV2eWI4WERLc1l2U0RUNklHdExFY21rVFBCbU52OFBUVE1tSWVidUpmTmZkN2tQalloZmVubWgwMElfelctSlBTeWNPdEc0N3l1RnJuZ3FrSWZHMW5pODR1Y2todERkZUhtUQ&q=https%3A%2F%2Fmega.nz%2Ffolder%2Ft7FCFJpS%23L_mWwsUnQJwFYbAQyEetIQ&v=oWKjnP6BKXw

    Score
    8/10
    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

4
T1082

Command and Control

Web Service

1
T1102

Tasks