Resubmissions

30/05/2024, 10:44

240530-mtardaee71 10

30/05/2024, 10:39

240530-mpzvpsfd57 8

30/05/2024, 10:32

240530-mlf87aec8z 10

30/05/2024, 10:26

240530-mgtcysfb47 8

General

  • Target

    sample

  • Size

    287KB

  • Sample

    240530-mpzvpsfd57

  • MD5

    6b4aa4f592bd9598f7a35f44060071de

  • SHA1

    faff88b0c10ee3b35ab1b1767e0b90d88d373e1c

  • SHA256

    47c091dc61bb5d861ba2d010ce9a66d103de3b34f73c7cf548e35f2d8bca487e

  • SHA512

    7fd52a3b7c69bc6397b1b0fe6d3cbab25542bc264038e7725d158eb8ddf6f31b88802b55e56794b9fb1db30bb30edea4ac7d4214a485ad562d7007481c655c91

  • SSDEEP

    3072:3VbT4wEJIaYl5jEjPJkrE3ukNIPLtnba1k+jJKB+yo:3VjEJIa9jPJVNIBnH+jJKwyo

Malware Config

Targets

    • Target

      sample

    • Size

      287KB

    • MD5

      6b4aa4f592bd9598f7a35f44060071de

    • SHA1

      faff88b0c10ee3b35ab1b1767e0b90d88d373e1c

    • SHA256

      47c091dc61bb5d861ba2d010ce9a66d103de3b34f73c7cf548e35f2d8bca487e

    • SHA512

      7fd52a3b7c69bc6397b1b0fe6d3cbab25542bc264038e7725d158eb8ddf6f31b88802b55e56794b9fb1db30bb30edea4ac7d4214a485ad562d7007481c655c91

    • SSDEEP

      3072:3VbT4wEJIaYl5jEjPJkrE3ukNIPLtnba1k+jJKB+yo:3VjEJIa9jPJVNIBnH+jJKwyo

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Modifies RDP port number used by Windows

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks