General

  • Target

    Delta V3.61 b_64320174.exe

  • Size

    9.5MB

  • Sample

    240906-vw11caydjj

  • MD5

    2ba8c3c68e800a1d528f5b02fbc5e239

  • SHA1

    44ce2f4f9028724899b2dd1ff36864f9c82d1840

  • SHA256

    bbadb6ccbd7d9d7dee928cf1c31b377b8b5732390bb22b76ed8b2015ac69aa3f

  • SHA512

    0e947fef1616c2a189e56c341bd29f2dbe91b9f45272f5f83cd0c0fe299dc36da758434d58a97d04b31d44662faee1e4838df6446da49e4a39986430e4713958

  • SSDEEP

    196608:FbxQvUVkRyQ+9rqN7mQ3bKfIiaNPFHNRsiKd0:FdQcVp7rqN7L3bIIiEHMnK

Malware Config

Targets

    • Target

      Delta V3.61 b_64320174.exe

    • Size

      9.5MB

    • MD5

      2ba8c3c68e800a1d528f5b02fbc5e239

    • SHA1

      44ce2f4f9028724899b2dd1ff36864f9c82d1840

    • SHA256

      bbadb6ccbd7d9d7dee928cf1c31b377b8b5732390bb22b76ed8b2015ac69aa3f

    • SHA512

      0e947fef1616c2a189e56c341bd29f2dbe91b9f45272f5f83cd0c0fe299dc36da758434d58a97d04b31d44662faee1e4838df6446da49e4a39986430e4713958

    • SSDEEP

      196608:FbxQvUVkRyQ+9rqN7mQ3bKfIiaNPFHNRsiKd0:FdQcVp7rqN7L3bIIiEHMnK

    • Creates new service(s)

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks for any installed AV software in registry

    • Checks whether UAC is enabled

    • Downloads MZ/PE file

    • Drops desktop.ini file(s)

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Remote Services: SMB/Windows Admin Shares

      Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).

    • Drops file in System32 directory

    • Enumerates processes with tasklist

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Matrix ATT&CK v13

Execution

System Services

1
T1569

Service Execution

1
T1569.002

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Event Triggered Execution

2
T1546

Netsh Helper DLL

1
T1546.007

Component Object Model Hijacking

1
T1546.015

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Event Triggered Execution

2
T1546

Netsh Helper DLL

1
T1546.007

Component Object Model Hijacking

1
T1546.015

Defense Evasion

Modify Registry

3
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Software Discovery

1
T1518

Security Software Discovery

1
T1518.001

System Information Discovery

5
T1082

Query Registry

5
T1012

Peripheral Device Discovery

1
T1120

Process Discovery

1
T1057

Browser Information Discovery

1
T1217

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Lateral Movement

Remote Services

1
T1021

SMB/Windows Admin Shares

1
T1021.002

Collection

Data from Local System

1
T1005

Tasks