Resubmissions

25-08-2024 01:15

240825-bl765azgkg 6

25-08-2024 01:07

240825-bgn8fszejd 10

25-08-2024 01:01

240825-bdhlha1drm 10

25-08-2024 00:58

240825-bb2atszbpf 10

25-08-2024 00:56

240825-bavrna1cnl 10

25-08-2024 00:53

240825-a8zmtszake 8

25-08-2024 00:51

240825-a7mxms1arj 4

25-08-2024 00:45

240825-a4djssyfre 3

25-08-2024 00:18

240825-alyr1sxfpf 10

General

  • Target

    https://github.com/Endermanch/MalwareDatabase

  • Sample

    240825-a8zmtszake

Malware Config

Targets

    • Target

      https://github.com/Endermanch/MalwareDatabase

    • Adds policy Run key to start application

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Legitimate hosting services abused for malware hosting/C2

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks