General

  • Target

    lss.png

  • Size

    406KB

  • Sample

    250207-ca3myatrht

  • MD5

    c30667dc34e4c3ee3fab434a66b630b2

  • SHA1

    16d65e159b4effa474e906dcac1996fde24dec85

  • SHA256

    28e4442eabab185845bd627573008026c021389c0475d27b5dfcfdeada8f7454

  • SHA512

    193ff947860ffbcac51ead891917d4c691d0cbab58ff761abbe311c461bdb6555c4e8b82c5d8984fa5cc6e31efcccf135b70567ddba2fa94cd5bb203b8efb4e0

  • SSDEEP

    12288:YV6AyNEbj4F1jharaki3ZadUcsJZvRne4k1G4uqw:GENsSNJoUckZvkB1lw

Malware Config

Targets

    • Target

      lss.png

    • Size

      406KB

    • MD5

      c30667dc34e4c3ee3fab434a66b630b2

    • SHA1

      16d65e159b4effa474e906dcac1996fde24dec85

    • SHA256

      28e4442eabab185845bd627573008026c021389c0475d27b5dfcfdeada8f7454

    • SHA512

      193ff947860ffbcac51ead891917d4c691d0cbab58ff761abbe311c461bdb6555c4e8b82c5d8984fa5cc6e31efcccf135b70567ddba2fa94cd5bb203b8efb4e0

    • SSDEEP

      12288:YV6AyNEbj4F1jharaki3ZadUcsJZvRne4k1G4uqw:GENsSNJoUckZvkB1lw

    • NetSupport

      NetSupport is a remote access tool sold as a legitimate system administration software.

    • Netsupport family

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Modifies WinLogon

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks