General

  • Target

    setup_ll2.msi

  • Size

    2.9MB

  • Sample

    241202-vs4bastncw

  • MD5

    cd137d3bdb80bb4b2fefe9bac6f1bf23

  • SHA1

    d30769a433cb7f01c78a1b088a26ddcb8036d367

  • SHA256

    2f940888c42e0fb3e6d625fc80ccdb5e6c26e43d6f87ad67cb020e287bfec07e

  • SHA512

    3e64935f12cb35fc6bca0172abc85a0040863ab610385e665c251930ebc8b85525a06b26770e395a8f37c8dc9ea43b500855751a89b94ccbb16e6f204786fb7d

  • SSDEEP

    49152:M+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:M+lUlz9FKbsodq0YaH7ZPxMb8tT

Malware Config

Targets

    • Target

      setup_ll2.msi

    • Size

      2.9MB

    • MD5

      cd137d3bdb80bb4b2fefe9bac6f1bf23

    • SHA1

      d30769a433cb7f01c78a1b088a26ddcb8036d367

    • SHA256

      2f940888c42e0fb3e6d625fc80ccdb5e6c26e43d6f87ad67cb020e287bfec07e

    • SHA512

      3e64935f12cb35fc6bca0172abc85a0040863ab610385e665c251930ebc8b85525a06b26770e395a8f37c8dc9ea43b500855751a89b94ccbb16e6f204786fb7d

    • SSDEEP

      49152:M+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:M+lUlz9FKbsodq0YaH7ZPxMb8tT

    • AteraAgent

      AteraAgent is a remote monitoring and management tool.

    • Ateraagent family

    • Detects AteraAgent

    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Downloads MZ/PE file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks