Resubmissions

20/05/2024, 18:20

240520-wy58hsbh53 8

20/05/2024, 18:12

240520-ws68macd7x 6

General

  • Target

    2016L.exe

  • Size

    17.0MB

  • Sample

    240520-wy58hsbh53

  • MD5

    3b9b9b3f64c48be0c315394b64f7392a

  • SHA1

    599ee50cb34d3a59e9fbf435bb439319da18f6da

  • SHA256

    cc2142007242aa7219f8e94ee7c1476895394cf29570284085d9bb1aed12c2cc

  • SHA512

    b5dc5bdaf547c09c970d2daaf1e1c17ef306ba62e1922250a0025071163e233c2c28d2a3abeea7ce4063bf89d376d14802a71aa9ab6a577a4b6fd29a90e3f6d8

  • SSDEEP

    196608:18I3GAY+1Ed7AQT5nXI4uFV1cM7rii2RexI2JRszCoJ3mX34NDcbbz9OWM5fWlQR:1j2AY5RvHJ2cD8bzgWMCi

Malware Config

Targets

    • Target

      2016L.exe

    • Size

      17.0MB

    • MD5

      3b9b9b3f64c48be0c315394b64f7392a

    • SHA1

      599ee50cb34d3a59e9fbf435bb439319da18f6da

    • SHA256

      cc2142007242aa7219f8e94ee7c1476895394cf29570284085d9bb1aed12c2cc

    • SHA512

      b5dc5bdaf547c09c970d2daaf1e1c17ef306ba62e1922250a0025071163e233c2c28d2a3abeea7ce4063bf89d376d14802a71aa9ab6a577a4b6fd29a90e3f6d8

    • SSDEEP

      196608:18I3GAY+1Ed7AQT5nXI4uFV1cM7rii2RexI2JRszCoJ3mX34NDcbbz9OWM5fWlQR:1j2AY5RvHJ2cD8bzgWMCi

    • Downloads MZ/PE file

    • Modifies Installed Components in the registry

    • Sets file execution options in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks