General
-
Target
spoofTRON.rar
-
Size
6.9MB
-
Sample
241128-hmrzvsvqbl
-
MD5
119f858d1c1250058fb4d5f6012dde2c
-
SHA1
2206adf2ef2245468ab25b65dab86cdbdd6836d3
-
SHA256
385e2cb864a7d92b88c019f82b9e6c6a9aaabfcff678cdac8adeec8ec929257c
-
SHA512
29c2ac78289757a2bdd46596b40fe767280c5f1307b657f58abfba17db8b533e41c3fb0f9e06861de2dcdcd8708217411b6e502c96837f7cd8214b186f47a7e2
-
SSDEEP
98304:WtsHYPkC+R1zsli0CsoI+ecyiM+vuo3HRheWjpYIEnwi2+LQ7bHgl9Yb5:Wts48DSHoruo32KYno+LmbgAb5
Behavioral task
behavioral1
Sample
SPOOFtron/Driver/SPOOFTRONDriver.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
SPOOFtron/SpoofTRON.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
SPOOFtron/Driver/SPOOFTRONDriver.exe
-
Size
225KB
-
MD5
af2379cc4d607a45ac44d62135fb7015
-
SHA1
39b6d40906c7f7f080e6befa93324dddadcbd9fa
-
SHA256
26b4699a7b9eeb16e76305d843d4ab05e94d43f3201436927e13b3ebafa90739
-
SHA512
69899c47d0b15f92980f79517384e83373242e045ca696c6e8f930ff6454219bf609e0d84c2f91d25dfd5ef3c28c9e099c4a3a918206e957be806a1c2e0d3e99
-
SSDEEP
6144:DCyjXhd1mialK+qoNr8PxtZE6x5v+k6f:rjXhd8ZlKOrMZE6x5b6f
Score6/10-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
-
-
Target
SPOOFtron/SpoofTRON.exe
-
Size
21.0MB
-
MD5
c67ed44f13abd015012b670b44f33976
-
SHA1
2b33db325c4643309e97b71f5b9eef1f020b20e8
-
SHA256
f88a3d60549f5a5e789c06ad0b647807de4c48d7173472e51a314b95df2c7a29
-
SHA512
85b6c7381e3d984416747b85989e4723252a89e775925ce64f3e12adc1ca972ac90b30c1e9a8ac7a53b4413d2c936966592f8c624b2caad2762a22863c38a30d
-
SSDEEP
98304:83DjWM8JEE1FMCamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEIFR:830oeNTfm/pf+xk4dWRpmrbW3jmr
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3