Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    HiddedLotus.dmg

  • Size

    548KB

  • Sample

    250209-b2q8jssncm

  • MD5

    54f7eadddcae17f1cb10d0cdaf426408

  • SHA1

    bda404cb5709a1f026c47a1c0508b2b753a47836

  • SHA256

    7769af718266fcc91c9f39eb71d1b137156b95d6e6704d9b783988e3421ac656

  • SHA512

    a1baa3532e2237a73e8ccc353b1e1de936ec49e2a3b995ae030092873f4f5bb74d7be47eb75e85a3da254f3d21c147e2327fa67b728e70ebe09d297ccc188179

  • SSDEEP

    12288:Z+u8CJLXDVykPpdRVVcAI7uV4fDmkggQgNfbhG:ffNPzVcApZgQgNf

Malware Config

Targets

    • Target

      HiddedLotus.dmg

    • Size

      548KB

    • MD5

      54f7eadddcae17f1cb10d0cdaf426408

    • SHA1

      bda404cb5709a1f026c47a1c0508b2b753a47836

    • SHA256

      7769af718266fcc91c9f39eb71d1b137156b95d6e6704d9b783988e3421ac656

    • SHA512

      a1baa3532e2237a73e8ccc353b1e1de936ec49e2a3b995ae030092873f4f5bb74d7be47eb75e85a3da254f3d21c147e2327fa67b728e70ebe09d297ccc188179

    • SSDEEP

      12288:Z+u8CJLXDVykPpdRVVcAI7uV4fDmkggQgNfbhG:ffNPzVcApZgQgNf

    • Hiddenlotus

      Hiddenlotus family.

    • Hiddenlotus family

    • Downloads MZ/PE file

    • Identifies devices as anti-VM

    • Queries the hardware information (I/O Kit registry).

      An adversary may attempt to get detailed information about the operating system and hardware, including version, patches, hotfixes, service packs, and architecture.

    • Queries the macOS version information.

      An adversary may attempt to get detailed information about the operating system and hardware, including version, patches, hotfixes, service packs, and architecture.

    • Modify File

      Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools.

    • File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.

    • Launch Agent

      Adversaries may create or modify launch agents to repeatedly execute malicious payloads as part of persistence.

    • Timestomp

      Adversaries may modify file time attributes to hide new or changes to existing files. Timestomping is a technique that modifies the timestamps of a file (the modify, access, create, and change times), often to mimic files that are in the same folder.

    • Target

      HiddedLotus/HiddedLotus.app/Contents/MacOS/Lê Thu Hà (HAEDC)

    • Size

      158KB

    • MD5

      bdc89808ed3b63aae8a79f20ce637213

    • SHA1

      b8c706e0f2e3de305c458009e11812f596eab2ee

    • SHA256

      49cef22b042acce025c89bd21a977fa4b488912dbd44e7109696a774cce72c24

    • SHA512

      d982ddcd728c35aa896e9bc8f79dd3ce4ccc8a47e027ac7d69167327b72e35f91af1c88aa4ef3b4a33912cdbd64924f7729f1f437fd26e25ce68936b662addce

    • SSDEEP

      3072:HhgodE/odtrrB0DOgkkDYAXMibmFGovcnA5HmSzzUtlJVV:Ooi/oPZkEA/qAS/UlJ/

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

    • Target

      HiddedLotus/HiddedLotus.app/Contents/Resources/configureDefault.sys

    • Size

      428KB

    • MD5

      f344d1b15be233d6fdc600d7aac76609

    • SHA1

      3e9cebc29c7e95fb152a8a0c8fcbd4470c46aadb

    • SHA256

      31f30c93721e9e5e483dd680d5aeff7e0863e2df925667ffd48e58eaf567212c

    • SHA512

      482a26e51803845505e96136bcee47b2ac67b87f3eeb604d80177859fd59c60ff5e2eff0336b5b2a5c1f20fb24b9be0f1f132acc8185b3f7a476a158849e656c

    • SSDEEP

      12288:As/3ZYHPeUqNykalNvB+mx2Ztb8a3Dpeg0QE:AsPuv2MlP+mMZl79j0QE

    • Downloads MZ/PE file

MITRE ATT&CK Enterprise v15

Tasks