Resubmissions

31/03/2025, 15:06

250331-sgykkavmt4 10

31/03/2025, 14:38

250331-rz3fssvjt2 3

16/08/2024, 16:02

240816-tg8wzatdmh 4

General

  • Target

    solarazip

  • Size

    119KB

  • Sample

    250331-sgykkavmt4

  • MD5

    9653cd9d03154e9652798725190f3593

  • SHA1

    b659f875788f4b5bc0a7a459f4abb28c74227272

  • SHA256

    4bb78f41a187427dab39d01db1388b75efc23bf5cf1e9d8ab2e7592b5e0a1d2a

  • SHA512

    c6a8e60ff42a4803b3b2e93c1e3fd453b8c9e18504807885529d869a942fd32f9978e120ec275fa848ebb20e6f15e657c019fbf59982a4015b5c434587274f32

  • SSDEEP

    1536:wjWapmOcV+3VsXHqKFGRWejHqPIYiqzyjWapmOcV+3VsXHqKNVg1ePeZ34wpRFgf:wjpVsaKXyjpVsaKNVhQgf

Malware Config

Targets

    • Target

      solarazip

    • Size

      119KB

    • MD5

      9653cd9d03154e9652798725190f3593

    • SHA1

      b659f875788f4b5bc0a7a459f4abb28c74227272

    • SHA256

      4bb78f41a187427dab39d01db1388b75efc23bf5cf1e9d8ab2e7592b5e0a1d2a

    • SHA512

      c6a8e60ff42a4803b3b2e93c1e3fd453b8c9e18504807885529d869a942fd32f9978e120ec275fa848ebb20e6f15e657c019fbf59982a4015b5c434587274f32

    • SSDEEP

      1536:wjWapmOcV+3VsXHqKFGRWejHqPIYiqzyjWapmOcV+3VsXHqKNVg1ePeZ34wpRFgf:wjpVsaKXyjpVsaKNVhQgf

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Modifies RDP port number used by Windows

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks