Resubmissions

17-01-2025 06:04

250117-gswpkavpbr 8

17-01-2025 05:35

250117-gac5havkaj 10

General

  • Target

    Malwarebytes.Premium.v5.1.0.102_AsanDownload.ir.zip

  • Size

    346.9MB

  • Sample

    250117-gswpkavpbr

  • MD5

    921d4d3124ae071493568c90e52fd99b

  • SHA1

    baeace2ee67fa2e124ee26dae720f5481efdc2f8

  • SHA256

    07d3885c26f6b485ab8b4283b04d53f58b64f6b43f4eb734658cc2a64c524d92

  • SHA512

    9eeda4edcd58b5775902815d1ad4312459833fdd29f96513f162f66a9a46e5098814a12ba040502f985eee0ff92c96c9bc4d19a2aca2296b231a37197fba5c4b

  • SSDEEP

    6291456:hrlrz4rRor4n8LH0h3HIfbMd2R85h+NJjRwfd77Pp+TgFxV73M5we:pZ4NgdL0oYlscbFxVIh

Malware Config

Targets

    • Target

      install/Patch/Patch_MB_5.x.exe

    • Size

      66.7MB

    • MD5

      e3a3662da8c190c7e522f3aced8b97e1

    • SHA1

      20ae6afe4f851e79c3cfec8375b0fbd53518032a

    • SHA256

      dfe7a2d70f947979258da2ae8636bc084e4905775f2185bc6c2ee21e2a57eb6d

    • SHA512

      357ae70d5c2f59bae01519da26b6fb631eb41dbf97e3e95927ed9f67c9423a004785e2e6cf8ab97a40102cc3ece552908456e038a9575550f2762bd6e9b43564

    • SSDEEP

      1572864:7Pk/elMidYLdjeXqY+jFvyDg94ZJF/+wRRWSJxd8:78/ehdYLdqXqFvy/AwRR3d8

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Command and Scripting Interpreter: PowerShell

      Start PowerShell.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks