Resubmissions

04-12-2024 03:29

241204-d2b5qszkgy 6

04-12-2024 03:28

241204-d1js7avnfr 4

03-12-2024 21:38

241203-1hgbnsvrds 4

11-11-2024 08:27

241111-kcemwsvrew 10

General

  • Target

    stinger64.exe

  • Size

    46.8MB

  • Sample

    241111-kcemwsvrew

  • MD5

    8b2e581985d25d62f445e35272b0166c

  • SHA1

    b9da986997c504d41dbcb2ba092950fb85d8c423

  • SHA256

    c30ffcd56304c8c37f3a909b8763bf0bac7ee171cf5d9b72bc16a904d3273271

  • SHA512

    5951c6714f38444fc3f15a351ffda226f9310282bda15cdc732774e0ea4c217438427cd3beba4fa30cb6dbc741b62377d0806748be7d4a9dd084607d2d46d34c

  • SSDEEP

    786432:yKNN8m/oiShrwFxCU+C5bUWUxEb140g1uwANq03j6QGBMiM5zPJeX57+8DUFJyft:pNaco5JKxCVCtUWX11QuDqMGQ4sJ27+a

Malware Config

Targets

    • Target

      stinger64.exe

    • Size

      46.8MB

    • MD5

      8b2e581985d25d62f445e35272b0166c

    • SHA1

      b9da986997c504d41dbcb2ba092950fb85d8c423

    • SHA256

      c30ffcd56304c8c37f3a909b8763bf0bac7ee171cf5d9b72bc16a904d3273271

    • SHA512

      5951c6714f38444fc3f15a351ffda226f9310282bda15cdc732774e0ea4c217438427cd3beba4fa30cb6dbc741b62377d0806748be7d4a9dd084607d2d46d34c

    • SSDEEP

      786432:yKNN8m/oiShrwFxCU+C5bUWUxEb140g1uwANq03j6QGBMiM5zPJeX57+8DUFJyft:pNaco5JKxCVCtUWX11QuDqMGQ4sJ27+a

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Zloader family

    • Zloader, Terdot, DELoader, ZeusSphinx

      Zloader is a malware strain that was initially discovered back in August 2015.

    • Creates new service(s)

    • Drops file in Drivers directory

    • A potential corporate email address has been identified in the URL: 0FD024EB6135CAAB0A495CAF@AdobeOrg

    • Impair Defenses: Safe Mode Boot

    • Indicator Removal: Clear Windows Event Logs

      Clear Windows Event Logs to hide the activity of an intrusion.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Downloads MZ/PE file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks