Resubmissions

22-11-2024 04:44

241122-fcs33azrfr 8

22-11-2024 04:11

241122-erzzgstqg1 10

General

  • Target

    SnuVy Spoof.exe

  • Size

    746KB

  • Sample

    241122-erzzgstqg1

  • MD5

    65b0e91512cc8d241ecc81dcba75d018

  • SHA1

    3552fd50d9db83ba21abc56c6cd986637c3df51f

  • SHA256

    9d3219f467a2616a7e6844ecbb0df5c5dddf8536d444691bd2c18bb899092eb2

  • SHA512

    5ef4fa0cb5645a2f6582e20f2e21b770737ae2938a8b609131ea6cefef269b938d5b2ca70713af8f071e5d3a04778e5b01a975f4b2e5f44090245c70aed9b017

  • SSDEEP

    12288:qr8DUq79BdXaHsLXqltIRIyr50UaGIdlijbZVIE:qrYUOBp5XqltmP6UaGEkj3

Malware Config

Targets

    • Target

      SnuVy Spoof.exe

    • Size

      746KB

    • MD5

      65b0e91512cc8d241ecc81dcba75d018

    • SHA1

      3552fd50d9db83ba21abc56c6cd986637c3df51f

    • SHA256

      9d3219f467a2616a7e6844ecbb0df5c5dddf8536d444691bd2c18bb899092eb2

    • SHA512

      5ef4fa0cb5645a2f6582e20f2e21b770737ae2938a8b609131ea6cefef269b938d5b2ca70713af8f071e5d3a04778e5b01a975f4b2e5f44090245c70aed9b017

    • SSDEEP

      12288:qr8DUq79BdXaHsLXqltIRIyr50UaGIdlijbZVIE:qrYUOBp5XqltmP6UaGEkj3

    • Deletes NTFS Change Journal

      The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.

    • Clears Windows event logs

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Stops running service(s)

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks