Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
1HiddedLotus.dmg
windows10-2004-x64
8HiddedLotus.dmg
windows10-ltsc 2021-x64
3HiddedLotus.dmg
windows11-21h2-x64
3HiddedLotus.dmg
macos-10.15-amd64
10HiddedLotu...HAEDC)
windows10-2004-x64
8HiddedLotu...HAEDC)
windows10-ltsc 2021-x64
8HiddedLotu...HAEDC)
windows11-21h2-x64
8HiddedLotu...HAEDC)
macos-10.15-amd64
4HiddedLotu...lt.pdf
windows10-2004-x64
8HiddedLotu...lt.pdf
windows10-ltsc 2021-x64
8HiddedLotu...lt.pdf
windows11-21h2-x64
3HiddedLotu...lt.pdf
macos-10.15-amd64
4General
-
Target
HiddedLotus.dmg
-
Size
548KB
-
Sample
250209-b2q8jssncm
-
MD5
54f7eadddcae17f1cb10d0cdaf426408
-
SHA1
bda404cb5709a1f026c47a1c0508b2b753a47836
-
SHA256
7769af718266fcc91c9f39eb71d1b137156b95d6e6704d9b783988e3421ac656
-
SHA512
a1baa3532e2237a73e8ccc353b1e1de936ec49e2a3b995ae030092873f4f5bb74d7be47eb75e85a3da254f3d21c147e2327fa67b728e70ebe09d297ccc188179
-
SSDEEP
12288:Z+u8CJLXDVykPpdRVVcAI7uV4fDmkggQgNfbhG:ffNPzVcApZgQgNf
Static task
static1
Behavioral task
behavioral1
Sample
HiddedLotus.dmg
Resource
win10v2004-20250207-en
Behavioral task
behavioral2
Sample
HiddedLotus.dmg
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral3
Sample
HiddedLotus.dmg
Resource
win11-20250207-en
Behavioral task
behavioral4
Sample
HiddedLotus.dmg
Resource
macos-20241106-en
Behavioral task
behavioral5
Sample
HiddedLotus/HiddedLotus.app/Contents/MacOS/Lê Thu Hà (HAEDC)
Resource
win10v2004-20250207-en
Behavioral task
behavioral6
Sample
HiddedLotus/HiddedLotus.app/Contents/MacOS/Lê Thu Hà (HAEDC)
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral7
Sample
HiddedLotus/HiddedLotus.app/Contents/MacOS/Lê Thu Hà (HAEDC)
Resource
win11-20250207-en
Behavioral task
behavioral8
Sample
HiddedLotus/HiddedLotus.app/Contents/MacOS/Lê Thu Hà (HAEDC)
Resource
macos-20241101-en
Behavioral task
behavioral9
Sample
HiddedLotus/HiddedLotus.app/Contents/Resources/configureDefault.pdf
Resource
win10v2004-20250207-en
Behavioral task
behavioral10
Sample
HiddedLotus/HiddedLotus.app/Contents/Resources/configureDefault.pdf
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral11
Sample
HiddedLotus/HiddedLotus.app/Contents/Resources/configureDefault.pdf
Resource
win11-20250207-en
Behavioral task
behavioral12
Sample
HiddedLotus/HiddedLotus.app/Contents/Resources/configureDefault.pdf
Resource
macos-20241106-en
Malware Config
Targets
-
-
Target
HiddedLotus.dmg
-
Size
548KB
-
MD5
54f7eadddcae17f1cb10d0cdaf426408
-
SHA1
bda404cb5709a1f026c47a1c0508b2b753a47836
-
SHA256
7769af718266fcc91c9f39eb71d1b137156b95d6e6704d9b783988e3421ac656
-
SHA512
a1baa3532e2237a73e8ccc353b1e1de936ec49e2a3b995ae030092873f4f5bb74d7be47eb75e85a3da254f3d21c147e2327fa67b728e70ebe09d297ccc188179
-
SSDEEP
12288:Z+u8CJLXDVykPpdRVVcAI7uV4fDmkggQgNfbhG:ffNPzVcApZgQgNf
-
Hiddenlotus family
-
Downloads MZ/PE file
-
Identifies devices as anti-VM
-
Queries the hardware information (I/O Kit registry).
An adversary may attempt to get detailed information about the operating system and hardware, including version, patches, hotfixes, service packs, and architecture.
-
Queries the macOS version information.
An adversary may attempt to get detailed information about the operating system and hardware, including version, patches, hotfixes, service packs, and architecture.
-
Modify File
Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools.
-
File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.
-
Launch Agent
Adversaries may create or modify launch agents to repeatedly execute malicious payloads as part of persistence.
-
Timestomp
Adversaries may modify file time attributes to hide new or changes to existing files. Timestomping is a technique that modifies the timestamps of a file (the modify, access, create, and change times), often to mimic files that are in the same folder.
-
-
-
Target
HiddedLotus/HiddedLotus.app/Contents/MacOS/Lê Thu Hà (HAEDC)
-
Size
158KB
-
MD5
bdc89808ed3b63aae8a79f20ce637213
-
SHA1
b8c706e0f2e3de305c458009e11812f596eab2ee
-
SHA256
49cef22b042acce025c89bd21a977fa4b488912dbd44e7109696a774cce72c24
-
SHA512
d982ddcd728c35aa896e9bc8f79dd3ce4ccc8a47e027ac7d69167327b72e35f91af1c88aa4ef3b4a33912cdbd64924f7729f1f437fd26e25ce68936b662addce
-
SSDEEP
3072:HhgodE/odtrrB0DOgkkDYAXMibmFGovcnA5HmSzzUtlJVV:Ooi/oPZkEA/qAS/UlJ/
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
-
-
Target
HiddedLotus/HiddedLotus.app/Contents/Resources/configureDefault.sys
-
Size
428KB
-
MD5
f344d1b15be233d6fdc600d7aac76609
-
SHA1
3e9cebc29c7e95fb152a8a0c8fcbd4470c46aadb
-
SHA256
31f30c93721e9e5e483dd680d5aeff7e0863e2df925667ffd48e58eaf567212c
-
SHA512
482a26e51803845505e96136bcee47b2ac67b87f3eeb604d80177859fd59c60ff5e2eff0336b5b2a5c1f20fb24b9be0f1f132acc8185b3f7a476a158849e656c
-
SSDEEP
12288:As/3ZYHPeUqNykalNvB+mx2Ztb8a3Dpeg0QE:AsPuv2MlP+mMZl79j0QE
Score8/10-
Downloads MZ/PE file
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1AppleScript
1System Services
1Launchctl
1Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Create or Modify System Process
1Launch Agent
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Create or Modify System Process
1Launch Agent
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Hide Artifacts
1Resource Forking
1Indicator Removal
2File Deletion
1Timestomp
1Masquerading
1Modify Registry
4