General
-
Target
ArbuzLoader.exe
-
Size
7.6MB
-
Sample
241228-wb1drazmgw
-
MD5
38f50afe0f9b273b183ac71b93296044
-
SHA1
9953e56a0b90bd1d8fbb8ea841810f51e9a49a64
-
SHA256
281615659775d6d8ab80faff90b562188834f78dd0c5f77bc9784d07710abbd9
-
SHA512
fd7b3eeb6ecd2d3e56741b277dd0c34d2685b76987d39b03874bf87289a9d9ffa26ebf8fef5c4b26aae5da260629c447da2788c42bd9f62f368ea1c15a29ad75
-
SSDEEP
196608:JoD+kd7EwfI9jUCBB7m+mKOY7rXrZusoSDmhfvsbnTNeWA:K59IHL7HmBYXrYSaUNy
Behavioral task
behavioral1
Sample
ArbuzLoader.exe
Resource
win10ltsc2021-20241211-en
Malware Config
Targets
-
-
Target
ArbuzLoader.exe
-
Size
7.6MB
-
MD5
38f50afe0f9b273b183ac71b93296044
-
SHA1
9953e56a0b90bd1d8fbb8ea841810f51e9a49a64
-
SHA256
281615659775d6d8ab80faff90b562188834f78dd0c5f77bc9784d07710abbd9
-
SHA512
fd7b3eeb6ecd2d3e56741b277dd0c34d2685b76987d39b03874bf87289a9d9ffa26ebf8fef5c4b26aae5da260629c447da2788c42bd9f62f368ea1c15a29ad75
-
SSDEEP
196608:JoD+kd7EwfI9jUCBB7m+mKOY7rXrZusoSDmhfvsbnTNeWA:K59IHL7HmBYXrYSaUNy
-
Checks for common network interception software
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
A potential corporate email address has been identified in the URL: currency-file@1
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Modify Registry
2Obfuscated Files or Information
1Command Obfuscation
1Subvert Trust Controls
3Install Root Certificate
1SIP and Trust Provider Hijacking
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Discovery
Browser Information Discovery
1Peripheral Device Discovery
2Process Discovery
1Query Registry
7Software Discovery
1System Information Discovery
8System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Wi-Fi Discovery
1