Resubmissions

05-10-2024 02:55

241005-detfha1fkp 10

05-10-2024 02:52

241005-dcxedavhnh 10

05-10-2024 02:44

241005-c8mdls1cjk 4

05-10-2024 02:43

241005-c7pgksvfjf 4

General

  • Target

    drfone_setup_full3824.exe

  • Size

    2.4MB

  • Sample

    241005-dcxedavhnh

  • MD5

    d083de3cd489927464db90cebf1a6e59

  • SHA1

    ee2b6ec10a5eeebc882302c4976d6edbc427b274

  • SHA256

    580a232eb87da0f8536e3e267318eb3d99ded46fe61631408b091cd497c60b42

  • SHA512

    89a31707b86804adc02bec5a36c277610d88862634325b0c9c2072d95dbe57491a4ef7b16b2c187fcb284831f969877ffd53253951d89c581af1ea1c48743970

  • SSDEEP

    49152:IvSzkJnOyQpABa+VsNbwzPhTzoL6Y0fxfNrBhf0uzkf+:Iqzkbkbhwz2Lb0fxfNrJ

Malware Config

Targets

    • Target

      drfone_setup_full3824.exe

    • Size

      2.4MB

    • MD5

      d083de3cd489927464db90cebf1a6e59

    • SHA1

      ee2b6ec10a5eeebc882302c4976d6edbc427b274

    • SHA256

      580a232eb87da0f8536e3e267318eb3d99ded46fe61631408b091cd497c60b42

    • SHA512

      89a31707b86804adc02bec5a36c277610d88862634325b0c9c2072d95dbe57491a4ef7b16b2c187fcb284831f969877ffd53253951d89c581af1ea1c48743970

    • SSDEEP

      49152:IvSzkJnOyQpABa+VsNbwzPhTzoL6Y0fxfNrBhf0uzkf+:Iqzkbkbhwz2Lb0fxfNrJ

    • Modifies firewall policy service

    • Creates new service(s)

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies Windows Firewall

    • Network Share Discovery

      Attempt to gather information on host network.

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks