General

  • Target

    Evidncias.7z

  • Size

    189KB

  • Sample

    250217-t73gwa1pz4

  • MD5

    0681bc686cb1076ef8062b1f91ae617f

  • SHA1

    851f15f874a80542daaf2d80db9f0ca8c9064ff4

  • SHA256

    d6302cd145ef24ce77f2120bbfa3a0294c4e2b06c7952ae8ccc4f5619a4ca827

  • SHA512

    aeb244249bdbf06004edd029d8edea61bfb522cb50785a65f3b892f2b87e10d35fa312a9ec84f6356021dbfc3f8a6036fc68ffe1c02cbe77d0a8cd1bed8d68e5

  • SSDEEP

    3072:YTe1+1vdXu0c6MNduQTwoB9ETjKmu/eUN1bYUckQOVGSyH51n337NBCOr4wJkKoY:Yi+1vfc6MNduDoB9OKmuhU8fyH51n33h

Malware Config

Extracted

Family

mylobot

C2

eakalra.ru:1281

op17.ru:6006

ashfkwu.ru:9821

pomplus.ru:7372

fasefja.ru:3410

hpifnad.ru:3721

benkofx.ru:3333

fpzskbx.ru:9364

ouxtjzd.ru:8658

schwpxp.ru:2956

pspkgya.ru:2675

lmlwtdm.ru:2768

rzwnsph.ru:5898

awtiwzk.ru:9816

pzljenb.ru:3486

yhjtpyf.ru:3565

ogkbsoq.ru:2553

rjngcbj.ru:5655

jlfeopz.ru:4698

wqcruiz.ru:2165

Targets

    • Target

      {62AD28B8-452C-7E36-3CCD-F2C44CD4FE54}/cf12f827.exe

    • Size

      261KB

    • MD5

      0cdd785ee2b4329f57811dab3169a470

    • SHA1

      5476f971739050607694e101668263c784292204

    • SHA256

      541ee62fd7aec363434040e58ff3216e45c4252bf1a51160f787ee6afde574c7

    • SHA512

      c95ad7e5eb82d8003fc1789b01c4948d6b7688cd565aa58a352e103a466bdeb7c4943cf6fd5a6d560d2bb32717764fc25ddbd2cc1701ae77eb49eb3e40b7294a

    • SSDEEP

      6144:wWEPhXngDPlCh76Nz8q3hF5cijiObEAE6d2FZNJydRM:ingD8hk3dcijboApaZ8+

    • Mylobot

      Botnet which first appeared in 2017 written in C++.

    • Mylobot family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Deletes itself

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • Target

      {62AD28B8-452C-7E36-8924-61F4F93D6D64}/cf12f827.exe

    • Size

      261KB

    • MD5

      0cdd785ee2b4329f57811dab3169a470

    • SHA1

      5476f971739050607694e101668263c784292204

    • SHA256

      541ee62fd7aec363434040e58ff3216e45c4252bf1a51160f787ee6afde574c7

    • SHA512

      c95ad7e5eb82d8003fc1789b01c4948d6b7688cd565aa58a352e103a466bdeb7c4943cf6fd5a6d560d2bb32717764fc25ddbd2cc1701ae77eb49eb3e40b7294a

    • SSDEEP

      6144:wWEPhXngDPlCh76Nz8q3hF5cijiObEAE6d2FZNJydRM:ingD8hk3dcijboApaZ8+

    • Mylobot

      Botnet which first appeared in 2017 written in C++.

    • Mylobot family

    • Downloads MZ/PE file

    • Deletes itself

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.