General

  • Target

    artifacts.zip

  • Size

    139.8MB

  • Sample

    240822-rv83savbnr

  • MD5

    d0e1b50214b55a05c9c36f5d6af0e5e0

  • SHA1

    29d6d783b4f55c9293e75d63dc58c92ad757d7b0

  • SHA256

    d34d5d293ef589bc20d27d216385f34706a8a049460633a9476222e0a3bd0680

  • SHA512

    021c08bbc3e30ff672cc69210295598b84f8d2aa33a7c42e11fc09a1b6b70627aba5281bf2903040d06f2049f1b4cbbc6684d280531a9cf89cc812f65ed4810f

  • SSDEEP

    3145728:RyRREc3Z0CqFp83bUchCAXDSlBAvPkKkzc+wVlOljKhvsPnN4yo8EmQ/Wqu9:yJWHG3LhCVleHkYlOljtN4GQ/Wqu9

Malware Config

Targets

    • Target

      artifacts.zip

    • Size

      139.8MB

    • MD5

      d0e1b50214b55a05c9c36f5d6af0e5e0

    • SHA1

      29d6d783b4f55c9293e75d63dc58c92ad757d7b0

    • SHA256

      d34d5d293ef589bc20d27d216385f34706a8a049460633a9476222e0a3bd0680

    • SHA512

      021c08bbc3e30ff672cc69210295598b84f8d2aa33a7c42e11fc09a1b6b70627aba5281bf2903040d06f2049f1b4cbbc6684d280531a9cf89cc812f65ed4810f

    • SSDEEP

      3145728:RyRREc3Z0CqFp83bUchCAXDSlBAvPkKkzc+wVlOljKhvsPnN4yo8EmQ/Wqu9:yJWHG3LhCVleHkYlOljtN4GQ/Wqu9

    • Checks for common network interception software

      Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Detected potential entity reuse from brand steam.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks