Resubmissions
16-09-2024 13:30
240916-qrrtnazfnl 10General
-
Target
BoatTuner Fixed-4644-1-0-1705794066.zip
-
Size
3KB
-
Sample
240916-qrrtnazfnl
-
MD5
cf68c426ab75a4f8c161d664296a5b66
-
SHA1
725e040db642920daebf737de056a7cec37fb6e2
-
SHA256
f459f7494cc498deccb42f8bdfa371ee6e63f354c077f8523391a410af22bd5c
-
SHA512
4be5aa44ea4d418712b2c28b10d513d3e885c6dec3728e6fe86b2ee48251ad24f77778f16f6e06e537d44f99e3a7c72d774f03f8ae49da656d8794a7fa3b3ef5
Static task
static1
Behavioral task
behavioral1
Sample
BoatTuner Fixed-4644-1-0-1705794066.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
BoatTuner Fixed-4644-1-0-1705794066.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
BoatTuner.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
BoatTuner.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
readme.txt
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
readme.txt
Resource
win10v2004-20240802-en
Malware Config
Extracted
revengerat
Guest
0.tcp.ngrok.io:19521
RV_MUTEX
Extracted
modiloader
https://drive.google.com/u/0/uc?id=1TcSctGVBajYMA7CFDc158wpvqkpxmkhJ&export=download
Targets
-
-
Target
BoatTuner Fixed-4644-1-0-1705794066.zip
-
Size
3KB
-
MD5
cf68c426ab75a4f8c161d664296a5b66
-
SHA1
725e040db642920daebf737de056a7cec37fb6e2
-
SHA256
f459f7494cc498deccb42f8bdfa371ee6e63f354c077f8523391a410af22bd5c
-
SHA512
4be5aa44ea4d418712b2c28b10d513d3e885c6dec3728e6fe86b2ee48251ad24f77778f16f6e06e537d44f99e3a7c72d774f03f8ae49da656d8794a7fa3b3ef5
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
ModiLoader First Stage
-
RevengeRat Executable
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Uses the VBS compiler for execution
-
Abuse Elevation Control Mechanism: Bypass User Account Control
UAC Bypass Attempt via SilentCleanup Task.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Modifies WinLogon
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
-
-
Target
BoatTuner.dll
-
Size
7KB
-
MD5
7dc69476e86d6de726829ab2e022e3ab
-
SHA1
d67a5a9b5050d0101c0735f88c5c546636e32f6d
-
SHA256
34586faa91d68880b3a13d3ce5733746ffefa309fbd0fcebd26bd78bfe939ada
-
SHA512
54301fd330df29e19e7cbc46530604e858db696774f1b90955ff47ba1dbf195ffd35163e792b2672013a7892b79299d3b79ee0c29d59987b6a066b00ded66d89
-
SSDEEP
96:GAssaLAASzkUDPi3YxhxyOAXZ29H+P8j/GcemU5o6f:SbLAASz1xhDCZ2N+kDGcer2K
Score1/10 -
-
-
Target
readme.txt
-
Size
484B
-
MD5
e803ce746bd34ffb322ab688285427a5
-
SHA1
a3a6f86ce7b1900adb9ffee26f5826fc765108a0
-
SHA256
af0c27edecb21fd8cd012f8b4571a91bd9011025d909b0b14975b87e3f078cc4
-
SHA512
9e463ec20063b26653abf2a5d1b2a0ce5caa0c64e8317a5515070613221121399b51ae4a80700c497dbddf39a17a208aa6e7539561ce99b73e24fc55ba8f066c
Score6/10-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Scripting
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Modify Registry
4Scripting
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3