Resubmissions

05-01-2025 22:30

250105-2ez52sxrbx 10

05-01-2025 22:27

250105-2dfp1szngm 3

General

  • Target

    https://cdn.discordapp.com/attachments/1295836954268668005/1325591415224533025/IDA_Pro_9.0.240925_RC1_Stable_Win_Mac_Linux__SDK_and_utilities_2024_ENG_rutracker-65814811.torrent?ex=677c58b5&is=677b0735&hm=8ef333da6a8f2440d0de7461236a9690142cda8c68ef8c27a5c5b2b32033b77d&

  • Sample

    250105-2ez52sxrbx

Malware Config

Targets

    • Target

      https://cdn.discordapp.com/attachments/1295836954268668005/1325591415224533025/IDA_Pro_9.0.240925_RC1_Stable_Win_Mac_Linux__SDK_and_utilities_2024_ENG_rutracker-65814811.torrent?ex=677c58b5&is=677b0735&hm=8ef333da6a8f2440d0de7461236a9690142cda8c68ef8c27a5c5b2b32033b77d&

    • Industroyer

      Contains code associated with parsing industroyer's configuration file.

    • Industroyer family

    • Contacts a large (661) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • A potential corporate email address has been identified in the URL: p@OV8z

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks