General

  • Target

    Sad Satan_qcxh-W1.exe

  • Size

    13.8MB

  • Sample

    240924-c5nr9swfma

  • MD5

    f3f16a12cdaf4e3fe51bece5dff8970f

  • SHA1

    e4bb36e12d8f566617f940c32764870e052a89b7

  • SHA256

    f1787b9553ce260b889cbb40b456d62f2cfa01b10f7e512a3528790c65640669

  • SHA512

    5b5837ee05f3a16c645613c5e0462b6d81d6e1dc183156b790e42cd8348fa6b391bdc84de43131cba4c568aba2be308d6e3020c829df0f11d44fd923f8cd827f

  • SSDEEP

    393216:MBBTeN30LpEiSCC9XSpIFwah3RuINhkU9he:ktwkLps9Xhrhhuahk7

Malware Config

Targets

    • Target

      Sad Satan_qcxh-W1.exe

    • Size

      13.8MB

    • MD5

      f3f16a12cdaf4e3fe51bece5dff8970f

    • SHA1

      e4bb36e12d8f566617f940c32764870e052a89b7

    • SHA256

      f1787b9553ce260b889cbb40b456d62f2cfa01b10f7e512a3528790c65640669

    • SHA512

      5b5837ee05f3a16c645613c5e0462b6d81d6e1dc183156b790e42cd8348fa6b391bdc84de43131cba4c568aba2be308d6e3020c829df0f11d44fd923f8cd827f

    • SSDEEP

      393216:MBBTeN30LpEiSCC9XSpIFwah3RuINhkU9he:ktwkLps9Xhrhhuahk7

    • Cobalt Strike reflective loader

      Detects the reflective loader used by Cobalt Strike.

    • Cobaltstrike

      Detected malicious payload which is part of Cobaltstrike.

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Creates new service(s)

    • Drops file in Drivers directory

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Downloads MZ/PE file

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Modifies Windows Firewall

    • Modifies powershell logging option

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks