General

  • Target

    Nessus-10.7.2-x64.msi

  • Size

    100.4MB

  • Sample

    240523-aqb4taeg54

  • MD5

    1f37134300996d73b90e303ed43015b0

  • SHA1

    76902f797742ba3737c98227bde0d6d17041d4ec

  • SHA256

    99f690503d8e968e7b9576e1b835d7274c5c93e12b473b78df844fbe81cf3352

  • SHA512

    aabfada28cc0ef764c800c207d9d03ada7c7e8eec543ebea653c1f999c052a4e02142c18419e446a432fe68010f3cb6855f3df3356f8202a71243eebac7060e0

  • SSDEEP

    1572864:wmptsYXW8boLwo9N9l+uPhsw1OFe2h+ZdhwBasWvEghI3yuLsa2Phzsu8oGK++h:aYm8b8GJWO4JdhwBasWrhIRLsf4u8K

Score
8/10

Malware Config

Targets

    • Target

      Nessus-10.7.2-x64.msi

    • Size

      100.4MB

    • MD5

      1f37134300996d73b90e303ed43015b0

    • SHA1

      76902f797742ba3737c98227bde0d6d17041d4ec

    • SHA256

      99f690503d8e968e7b9576e1b835d7274c5c93e12b473b78df844fbe81cf3352

    • SHA512

      aabfada28cc0ef764c800c207d9d03ada7c7e8eec543ebea653c1f999c052a4e02142c18419e446a432fe68010f3cb6855f3df3356f8202a71243eebac7060e0

    • SSDEEP

      1572864:wmptsYXW8boLwo9N9l+uPhsw1OFe2h+ZdhwBasWvEghI3yuLsa2Phzsu8oGK++h:aYm8b8GJWO4JdhwBasWrhIRLsf4u8K

    Score
    8/10
    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Drops file in Drivers directory

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • Modifies file permissions

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Defense Evasion

Subvert Trust Controls

1
T1553

SIP and Trust Provider Hijacking

1
T1553.003

File and Directory Permissions Modification

1
T1222

Discovery

Query Registry

4
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

4
T1082

Tasks