General

  • Target

    utorrent_installer.exe

  • Size

    1.7MB

  • Sample

    240620-nnvd9svfkc

  • MD5

    2946f36b3dce4220bc7010a548bfdd4c

  • SHA1

    e527ef695ad98f3ba178d0099ef514ee2ca91581

  • SHA256

    20342a17d6b04dcecd447e9f1cd0658053e7aba6c42cd73ae3f3963b3981581b

  • SHA512

    595535e089acf80e1ba147e210ef03407bd25b600e32259d97e9057dfe91122d685b67b618ad66d4589fcc1b0e8ef24c0a07537a590ebc65ded0d95b28fab498

  • SSDEEP

    24576:G7FUDowAyrTVE3U5FKFkZPrPucyOqVZS0xurHHNDCc4TGDuN0AgKSi2S7:GBuZrEU/PXxURx2NDC1TjKK

Malware Config

Targets

    • Target

      utorrent_installer.exe

    • Size

      1.7MB

    • MD5

      2946f36b3dce4220bc7010a548bfdd4c

    • SHA1

      e527ef695ad98f3ba178d0099ef514ee2ca91581

    • SHA256

      20342a17d6b04dcecd447e9f1cd0658053e7aba6c42cd73ae3f3963b3981581b

    • SHA512

      595535e089acf80e1ba147e210ef03407bd25b600e32259d97e9057dfe91122d685b67b618ad66d4589fcc1b0e8ef24c0a07537a590ebc65ded0d95b28fab498

    • SSDEEP

      24576:G7FUDowAyrTVE3U5FKFkZPrPucyOqVZS0xurHHNDCc4TGDuN0AgKSi2S7:GBuZrEU/PXxURx2NDC1TjKK

    • Cobalt Strike reflective loader

      Detects the reflective loader used by Cobalt Strike.

    • Cobaltstrike

      Detected malicious payload which is part of Cobaltstrike.

    • Drops file in Drivers directory

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks whether UAC is enabled

    • Downloads MZ/PE file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies powershell logging option

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks