General

  • Target

    spoofTRON.rar

  • Size

    6.9MB

  • Sample

    241128-hmrzvsvqbl

  • MD5

    119f858d1c1250058fb4d5f6012dde2c

  • SHA1

    2206adf2ef2245468ab25b65dab86cdbdd6836d3

  • SHA256

    385e2cb864a7d92b88c019f82b9e6c6a9aaabfcff678cdac8adeec8ec929257c

  • SHA512

    29c2ac78289757a2bdd46596b40fe767280c5f1307b657f58abfba17db8b533e41c3fb0f9e06861de2dcdcd8708217411b6e502c96837f7cd8214b186f47a7e2

  • SSDEEP

    98304:WtsHYPkC+R1zsli0CsoI+ecyiM+vuo3HRheWjpYIEnwi2+LQ7bHgl9Yb5:Wts48DSHoruo32KYno+LmbgAb5

Malware Config

Targets

    • Target

      SPOOFtron/Driver/SPOOFTRONDriver.exe

    • Size

      225KB

    • MD5

      af2379cc4d607a45ac44d62135fb7015

    • SHA1

      39b6d40906c7f7f080e6befa93324dddadcbd9fa

    • SHA256

      26b4699a7b9eeb16e76305d843d4ab05e94d43f3201436927e13b3ebafa90739

    • SHA512

      69899c47d0b15f92980f79517384e83373242e045ca696c6e8f930ff6454219bf609e0d84c2f91d25dfd5ef3c28c9e099c4a3a918206e957be806a1c2e0d3e99

    • SSDEEP

      6144:DCyjXhd1mialK+qoNr8PxtZE6x5v+k6f:rjXhd8ZlKOrMZE6x5b6f

    Score
    6/10
    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Target

      SPOOFtron/SpoofTRON.exe

    • Size

      21.0MB

    • MD5

      c67ed44f13abd015012b670b44f33976

    • SHA1

      2b33db325c4643309e97b71f5b9eef1f020b20e8

    • SHA256

      f88a3d60549f5a5e789c06ad0b647807de4c48d7173472e51a314b95df2c7a29

    • SHA512

      85b6c7381e3d984416747b85989e4723252a89e775925ce64f3e12adc1ca972ac90b30c1e9a8ac7a53b4413d2c936966592f8c624b2caad2762a22863c38a30d

    • SSDEEP

      98304:83DjWM8JEE1FMCamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEIFR:830oeNTfm/pf+xk4dWRpmrbW3jmr

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks