General

  • Target

    chthonic_2.23.12.10.vir

  • Size

    160KB

  • Sample

    200719-6q8h7w57ns

  • MD5

    bd733b7cb157275ff7a2b2ff287589a0

  • SHA1

    31eb1df25b5f1e799a451ea536f0674042bd19c8

  • SHA256

    d6324644c2a267bea0322c4f817b7a4029129e68959cdeb25f53f8e1f9ddeaad

  • SHA512

    b2341190d6a76e0d1f752f820a8f14f0a3b492e15c5d56a96a82c631e981f8b0e816287e8894ccb2966dc85f8440a6909a0b2f136d61080efcb00b148cf383bd

Malware Config

Targets

    • Target

      chthonic_2.23.12.10.vir

    • Size

      160KB

    • MD5

      bd733b7cb157275ff7a2b2ff287589a0

    • SHA1

      31eb1df25b5f1e799a451ea536f0674042bd19c8

    • SHA256

      d6324644c2a267bea0322c4f817b7a4029129e68959cdeb25f53f8e1f9ddeaad

    • SHA512

      b2341190d6a76e0d1f752f820a8f14f0a3b492e15c5d56a96a82c631e981f8b0e816287e8894ccb2966dc85f8440a6909a0b2f136d61080efcb00b148cf383bd

    • Modifies Windows Defender Real-time Protection settings

    • UAC bypass

    • Adds policy Run key to start application

    • Blacklisted process makes network request

    • Disables taskbar notifications via registry modification

    • Deletes itself

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

5
T1112

Disabling Security Tools

2
T1089

Bypass User Account Control

1
T1088

Discovery

System Information Discovery

1
T1082

Tasks