General

  • Target

    chthonic_2.23.17.10.vir

  • Size

    1.8MB

  • Sample

    200719-rq4vcw3yy2

  • MD5

    73613b116ebb614b2964038b3f937db0

  • SHA1

    7872e57d9e89fb65f22f51d93a5ac3ca39fc30da

  • SHA256

    b39a13030095984b1a1a5584c8aa7d974a40aa631ef5b27ab933cc5d40799deb

  • SHA512

    5d87c3bf9e438bbee3287d00b267f31d7bcb93b1fbc1fbc6aa2035bc502f5ca73d4e03e2711b6dfc73b06044e746ae15b23b95bf8dce394889073bdc0890b334

Malware Config

Targets

    • Target

      chthonic_2.23.17.10.vir

    • Size

      1.8MB

    • MD5

      73613b116ebb614b2964038b3f937db0

    • SHA1

      7872e57d9e89fb65f22f51d93a5ac3ca39fc30da

    • SHA256

      b39a13030095984b1a1a5584c8aa7d974a40aa631ef5b27ab933cc5d40799deb

    • SHA512

      5d87c3bf9e438bbee3287d00b267f31d7bcb93b1fbc1fbc6aa2035bc502f5ca73d4e03e2711b6dfc73b06044e746ae15b23b95bf8dce394889073bdc0890b334

    • Modifies Windows Defender Real-time Protection settings

    • UAC bypass

    • Blacklisted process makes network request

    • Disables taskbar notifications via registry modification

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Modifies service

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

2
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

7
T1112

Disabling Security Tools

2
T1089

Bypass User Account Control

1
T1088

Install Root Certificate

1
T1130

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Tasks