General

  • Target

    chthonic_2.2.2.0.vir

  • Size

    124KB

  • Sample

    200719-n92le93lex

  • MD5

    eeac9de24d64a8cdbc5a3efabf736b2f

  • SHA1

    b57aef1904ffd2e7a0014848ba1870048f150816

  • SHA256

    262a89d01968ca23f76f345aeb75d88cc6c65b02fd471d7d2adaa083d3d57d03

  • SHA512

    3b185cbde217e92cbdd2abf17a68b4977338abc47a121f8d4bd14cf6ae6d4725c9c7cefa0cf1f397037ee452a3c701b8313830e789058455d09a57283d5c5f3d

Malware Config

Targets

    • Target

      chthonic_2.2.2.0.vir

    • Size

      124KB

    • MD5

      eeac9de24d64a8cdbc5a3efabf736b2f

    • SHA1

      b57aef1904ffd2e7a0014848ba1870048f150816

    • SHA256

      262a89d01968ca23f76f345aeb75d88cc6c65b02fd471d7d2adaa083d3d57d03

    • SHA512

      3b185cbde217e92cbdd2abf17a68b4977338abc47a121f8d4bd14cf6ae6d4725c9c7cefa0cf1f397037ee452a3c701b8313830e789058455d09a57283d5c5f3d

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Adds policy Run key to start application

    • Disables taskbar notifications via registry modification

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

4
T1112

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Discovery

System Information Discovery

1
T1082

Tasks