General

  • Target

    chthonic_2.23.14.3.vir

  • Size

    316KB

  • Sample

    200719-5a64trasxj

  • MD5

    c73bb0ecba9a48fa54ce209becf415a1

  • SHA1

    71323430b7752734c495e1bbb42889ebc041a5c8

  • SHA256

    5124f1b8847074cf927f1fe6dec6657a3a50c32e924f7ff915c926604c207b25

  • SHA512

    1aaaf0457a3453c5dc4ec9fbffe69816c412ac3ab987973a095873668688f82129d196f91a7b44ede0a9fcebf52bad9de84ad100b97a135ea77ed6fa21a37c1e

Malware Config

Targets

    • Target

      chthonic_2.23.14.3.vir

    • Size

      316KB

    • MD5

      c73bb0ecba9a48fa54ce209becf415a1

    • SHA1

      71323430b7752734c495e1bbb42889ebc041a5c8

    • SHA256

      5124f1b8847074cf927f1fe6dec6657a3a50c32e924f7ff915c926604c207b25

    • SHA512

      1aaaf0457a3453c5dc4ec9fbffe69816c412ac3ab987973a095873668688f82129d196f91a7b44ede0a9fcebf52bad9de84ad100b97a135ea77ed6fa21a37c1e

    • Modifies Windows Defender Real-time Protection settings

    • UAC bypass

    • Adds policy Run key to start application

    • Blacklisted process makes network request

    • Disables taskbar notifications via registry modification

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

5
T1112

Disabling Security Tools

2
T1089

Bypass User Account Control

1
T1088

Discovery

System Information Discovery

1
T1082

Tasks