Resubmissions

13-08-2024 04:26

240813-e2kybaygqk 10

13-08-2024 04:11

240813-er4mnsydmn 10

07-08-2024 20:05

240807-yvb7dawhrb 7

General

  • Target

    driver_booster_setup.exe

  • Size

    28.4MB

  • Sample

    240813-e2kybaygqk

  • MD5

    2c99c30d6e3805acda4235e789b7d089

  • SHA1

    0a1e695ad2db32c91773599c1a8d637c8a975c57

  • SHA256

    743881f014d40332960f205a12a438e90f45b0f01516d2948b3e3ea1b460e109

  • SHA512

    4ddb9e8d090593d380df94c59ff4604a0e6ee40417e5ecfe451baa8b05a5df48b42d26fbdda742f4ec0335222193e7a641d1b9377259d9376a534c7d6a89e69e

  • SSDEEP

    786432:09NT6fGyBjXfVHe2M5CJxPxIT40oHt6ZJdBjls6cj7RxYAP/i+:0/uGyy2Xx5zVHu3s6cjcu//

Malware Config

Targets

    • Target

      driver_booster_setup.exe

    • Size

      28.4MB

    • MD5

      2c99c30d6e3805acda4235e789b7d089

    • SHA1

      0a1e695ad2db32c91773599c1a8d637c8a975c57

    • SHA256

      743881f014d40332960f205a12a438e90f45b0f01516d2948b3e3ea1b460e109

    • SHA512

      4ddb9e8d090593d380df94c59ff4604a0e6ee40417e5ecfe451baa8b05a5df48b42d26fbdda742f4ec0335222193e7a641d1b9377259d9376a534c7d6a89e69e

    • SSDEEP

      786432:09NT6fGyBjXfVHe2M5CJxPxIT40oHt6ZJdBjls6cj7RxYAP/i+:0/uGyy2Xx5zVHu3s6cjcu//

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Creates new service(s)

    • Sets service image path in registry

    • Stops running service(s)

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Downloads MZ/PE file

    • Legitimate hosting services abused for malware hosting/C2

    • Modifies Windows Firewall

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks