Resubmissions

09-11-2024 10:24

241109-mfcc2svraj 8

09-11-2024 10:22

241109-mek9kasfpc 7

General

  • Target

    ERROR 422 Remastered.rar

  • Size

    10.4MB

  • Sample

    241109-mfcc2svraj

  • MD5

    5bf0b2153890babb086a0a1f799c0ada

  • SHA1

    470ea5b868886b96fc2d7d4b3942336a6ba707c8

  • SHA256

    e573cdaa955a901ba822e21c65603a7cf17de7ce25a92840a92e2e84b1bfd858

  • SHA512

    b4ac4ad61d5f16e8fe36cc03906274ce50753dea4a9723e6951e9cf52d6fbc511760c541f4fe07628a804f2ea241b55aab4d4e092f948d4c04358cac65edd6bb

  • SSDEEP

    196608:igGPfvxlhy0uxnIWJtGgu//ZhLaHzh5M9lgodw9smDN7NqcZ1eyqgztwNxY/UtJQ:az4vJTuXZ095JoqlDlNpeyLw7Y+K1

Malware Config

Targets

    • Target

      ERROR 422 Remastered/ERROR422.exe

    • Size

      10.4MB

    • MD5

      c15722d1f29b28fefac3a34c1d1a296a

    • SHA1

      cf775816f832f08a024de89c96eb9311ef2a66c5

    • SHA256

      c1d06468a2f089b4f6efbd51f4a140be40283e2efc76d25712e63471bca9f235

    • SHA512

      11618e411a8c55eb0a6f7cea0a0c0a70c5df521652cadc09339d43dffcdb7da15155adb8d42bf8a214f542382f01c29086fb14258ea5eab91bb2335474a070ad

    • SSDEEP

      196608:SoCIRHixqAPLu63SXYGXZJR3RSivHiW2VIfjZOlQoke6LOZBoA/wZaKWX:SnAiqAjyTl3jvCPmj8eokeQ4/EabX

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • A potential corporate email address has been identified in the URL: Robotowght@500

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Legitimate hosting services abused for malware hosting/C2

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks