Resubmissions

25-07-2024 14:37

240725-rzbyvatfmn 10

25-07-2024 14:37

240725-ry8lesxarg 10

25-07-2024 14:37

240725-ry4mgaxarb 10

25-07-2024 14:36

240725-ryx5paxaqd 10

25-07-2024 14:36

240725-rytr9stfkj 10

25-07-2024 14:36

240725-ryqqlstfjq 10

25-07-2024 14:36

240725-rymc7axand 10

25-07-2024 14:35

240725-rydfaaterk 10

General

  • Target

    Nursultan 3.0.exe

  • Size

    347KB

  • Sample

    240725-rzbyvatfmn

  • MD5

    3500fc8f168c23e6170117e6b779ed52

  • SHA1

    0109abb6ff102e3b8f17bfac07f599d787af8663

  • SHA256

    ed2be8c7b8aa15f1e3bc399b9aaadbdbb16374e0be30d0200d4f39998f1f25a8

  • SHA512

    3d1e2600f1e2b077ab24ed017dee2313f14b34a7c193d8db19a93bb3cc6cd95b620b50c2ab300e958afbeea1fa1d133758664282f60b97b583d748baf056e85f

  • SSDEEP

    6144:igpFNojFilyzigCEcL6hl9he6VlWT8b9G3T8JUKvDbwmb0h6XW:T8Ri4h3hPVle84AWcIeXW

Malware Config

Targets

    • Target

      Nursultan 3.0.exe

    • Size

      347KB

    • MD5

      3500fc8f168c23e6170117e6b779ed52

    • SHA1

      0109abb6ff102e3b8f17bfac07f599d787af8663

    • SHA256

      ed2be8c7b8aa15f1e3bc399b9aaadbdbb16374e0be30d0200d4f39998f1f25a8

    • SHA512

      3d1e2600f1e2b077ab24ed017dee2313f14b34a7c193d8db19a93bb3cc6cd95b620b50c2ab300e958afbeea1fa1d133758664282f60b97b583d748baf056e85f

    • SSDEEP

      6144:igpFNojFilyzigCEcL6hl9he6VlWT8b9G3T8JUKvDbwmb0h6XW:T8Ri4h3hPVle84AWcIeXW

    • Modifies WinLogon for persistence

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks