General

  • Target

    utorrent_installer.exe

  • Size

    1.7MB

  • Sample

    240612-pgbh9ayapq

  • MD5

    f8bdbf7ec44425d48898e066927004de

  • SHA1

    e2f17b0ef7743910ea7f3c653bb49ed1ebb30f4c

  • SHA256

    63c8b88dc7e900dcc065c84360f7c785089a7db23a885cca6b1ec0902ed7438f

  • SHA512

    23d7f3004d0de7a14e0cdc4520d8643e79008d55cacb776922ef61ddbe150d97bd7755dc9db2c132e7016b92d0a05f864cefae2e403c3081f0a8d8b3a562e657

  • SSDEEP

    24576:E7FUDowAyrTVE3U5FKTkZZyIownxvrKUS0ug8+pDo7h6BhloaZh9eRC4:EBuZrEU6PaKUJBod6BhloyLeRP

Malware Config

Targets

    • Target

      utorrent_installer.exe

    • Size

      1.7MB

    • MD5

      f8bdbf7ec44425d48898e066927004de

    • SHA1

      e2f17b0ef7743910ea7f3c653bb49ed1ebb30f4c

    • SHA256

      63c8b88dc7e900dcc065c84360f7c785089a7db23a885cca6b1ec0902ed7438f

    • SHA512

      23d7f3004d0de7a14e0cdc4520d8643e79008d55cacb776922ef61ddbe150d97bd7755dc9db2c132e7016b92d0a05f864cefae2e403c3081f0a8d8b3a562e657

    • SSDEEP

      24576:E7FUDowAyrTVE3U5FKTkZZyIownxvrKUS0ug8+pDo7h6BhloaZh9eRC4:EBuZrEU6PaKUJBod6BhloyLeRP

    • Cobalt Strike reflective loader

      Detects the reflective loader used by Cobalt Strike.

    • Cobaltstrike

      Detected malicious payload which is part of Cobaltstrike.

    • Drops file in Drivers directory

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Downloads MZ/PE file

    • Drops Chrome extension

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies powershell logging option

    • Sets file execution options in registry

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

3
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

3
T1547.001

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

5
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

10
T1012

System Information Discovery

8
T1082

Virtualization/Sandbox Evasion

1
T1497

Software Discovery

1
T1518

Security Software Discovery

1
T1518.001

Peripheral Device Discovery

2
T1120

Collection

Data from Local System

1
T1005

Tasks