General

  • Target

    kvrt.exe

  • Size

    106.4MB

  • Sample

    240903-vh1ses1fpm

  • MD5

    a4df282747309e62f6189f885b848ac9

  • SHA1

    fc9c0996990b8d1bf67f0ad9d5e135c7eccae930

  • SHA256

    5fea2617878995a2d04e6fbd168b0f13e2e20693b01360925269b4b4b4e687f8

  • SHA512

    001399a46deb5be06ac0b136b5df3dbcec248f7ad1c871d17799b451bc9b8bb9b095968b272cff2c569765d459972cac0d4d73f10b02ee82f06a1202fe399729

  • SSDEEP

    3145728:eriOgqJaj3+d86bF4p6UUWri0SstOZhup:eriODq3i8eF4p6ULSstOnup

Malware Config

Targets

    • Target

      kvrt.exe

    • Size

      106.4MB

    • MD5

      a4df282747309e62f6189f885b848ac9

    • SHA1

      fc9c0996990b8d1bf67f0ad9d5e135c7eccae930

    • SHA256

      5fea2617878995a2d04e6fbd168b0f13e2e20693b01360925269b4b4b4e687f8

    • SHA512

      001399a46deb5be06ac0b136b5df3dbcec248f7ad1c871d17799b451bc9b8bb9b095968b272cff2c569765d459972cac0d4d73f10b02ee82f06a1202fe399729

    • SSDEEP

      3145728:eriOgqJaj3+d86bF4p6UUWri0SstOZhup:eriODq3i8eF4p6ULSstOnup

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Impair Defenses: Safe Mode Boot

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks