General

  • Target

    chthonic_2.23.0.0.vir

  • Size

    134KB

  • Sample

    200719-xhfznmkwgj

  • MD5

    74c2e99266737e7321f9572f93263a17

  • SHA1

    4bcde2c2213a52394714316281ed8631af1c8cbc

  • SHA256

    1cd004a6d75bc1ebf7d92ddd6af583caad44dd750906e4797460e7e615e777a7

  • SHA512

    2336129b6c722e1f781930b4b1adabe44f1c58269f3ecaa27b0536d166f8488ed5223d2d8fe30eecbe8903a13a7870ade2dc61e521474d06ebfb5770e0836d23

Malware Config

Targets

    • Target

      chthonic_2.23.0.0.vir

    • Size

      134KB

    • MD5

      74c2e99266737e7321f9572f93263a17

    • SHA1

      4bcde2c2213a52394714316281ed8631af1c8cbc

    • SHA256

      1cd004a6d75bc1ebf7d92ddd6af583caad44dd750906e4797460e7e615e777a7

    • SHA512

      2336129b6c722e1f781930b4b1adabe44f1c58269f3ecaa27b0536d166f8488ed5223d2d8fe30eecbe8903a13a7870ade2dc61e521474d06ebfb5770e0836d23

    • Modifies Windows Defender Real-time Protection settings

    • UAC bypass

    • Adds policy Run key to start application

    • Disables taskbar notifications via registry modification

    • Deletes itself

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

5
T1112

Disabling Security Tools

2
T1089

Bypass User Account Control

1
T1088

Discovery

System Information Discovery

1
T1082

Tasks