General

  • Target

    Malwarebytes_Premium_5.1.1.106-(www.Patoghu.com).rar

  • Size

    356.4MB

  • Sample

    250116-rrdsgavjbs

  • MD5

    f2e6b9a05c6e29cca248ac9e186689c4

  • SHA1

    1c5cc44b8eb72c9d2528d98b1e23b4adf4d14e45

  • SHA256

    4f3ff4dc6647db9811d8c417f6ebc28196702997660d8c1139be9ebd7af12ac6

  • SHA512

    980d86213004cbe70da07d5ffa134124cc7a868f1283a6b92212c4522d416b9378dceda2c30789a86ff726a6c1f830e690d03559a0bcb7053eca5bf8937c66bc

  • SSDEEP

    6291456:W4alEBD7mKlSmkecbOZo+NpSAWJC7aAMfLisLeXYB2R0iuaXIeDKbw59:Qut7z9jho+3SAa7zXLeXYBhYfDSw59

Malware Config

Targets

    • Target

      Malwarebytes_Premium_5.1.1.106-(www.Patoghu.com)/Malwarebytes Premium 5.1.1.106 Multilingual/Crack/Patch.exe

    • Size

      65.3MB

    • MD5

      720d4425c920dd3e6d1928b0946c1765

    • SHA1

      f9b8f46f392c3cb11458ecee23270aa8a8479efa

    • SHA256

      bd526968893102942c27d3c6c89cd92e066268bde0bc83a5569be090227d5257

    • SHA512

      29fa37f30199226f0bb8bc9f33e8f0dfa1b854b5fb51e19acc1c72ae7919c31976c50c4436c9ff610431e96b3668ff06c5b9366514ddb4186ff6e3f9997db39c

    • SSDEEP

      1572864:mKoOTa0qcP0gR8xcbkcAeuQAPLV3kZKPMwJaFMMOWQllS:1oAdTMgGibJAGAjZJ4MMGnS

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Command and Scripting Interpreter: PowerShell

      Start PowerShell.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks