Resubmissions

09-05-2024 12:59

240509-p8d4fsdf27 10

09-05-2024 12:50

240509-p298badc26 10

09-05-2024 12:45

240509-py7b9aab8t 8

09-05-2024 12:25

240509-plr2sscb99 10

General

  • Target

    DevxExecutor.exe

  • Size

    44.1MB

  • Sample

    240509-p298badc26

  • MD5

    e4897ef7419e128b1f7473119ce0bd07

  • SHA1

    5aad252412a5923438f30cb9c397731a9b020121

  • SHA256

    6d5ba38a5e9bde7939ac5dcb8fdcb970701168064d30abcf518cf8d272a0f581

  • SHA512

    db66ea2cb3f5f30934ab071e1dd2e7b41f6dc5c4be125f1d2d6aab627b3be8b6cf8fcbed517a414cdf037a068414b178176edba2e28de6419b65269e0abb162c

  • SSDEEP

    786432:NCZkrrfdktmLX8t8lBBvUPlZIOPuOI64zlNWtVMoOIsuXzfVib4a9BWN:N4GlkcLMtUzilKUINzmtVkMfWo

Malware Config

Targets

    • Target

      DevxExecutor.exe

    • Size

      44.1MB

    • MD5

      e4897ef7419e128b1f7473119ce0bd07

    • SHA1

      5aad252412a5923438f30cb9c397731a9b020121

    • SHA256

      6d5ba38a5e9bde7939ac5dcb8fdcb970701168064d30abcf518cf8d272a0f581

    • SHA512

      db66ea2cb3f5f30934ab071e1dd2e7b41f6dc5c4be125f1d2d6aab627b3be8b6cf8fcbed517a414cdf037a068414b178176edba2e28de6419b65269e0abb162c

    • SSDEEP

      786432:NCZkrrfdktmLX8t8lBBvUPlZIOPuOI64zlNWtVMoOIsuXzfVib4a9BWN:N4GlkcLMtUzilKUINzmtVkMfWo

    • MilleniumRat

      MilleniumRat is a remote access trojan written in C#.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Contacts a large (2505) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks