Resubmissions

30-06-2024 22:02

240630-1x34zszgjn 8

30-06-2024 21:56

240630-1tmmtswhjg 7

General

  • Target

    InvisibleClient.zip

  • Size

    7.1MB

  • Sample

    240630-1x34zszgjn

  • MD5

    6d16e7e1717f56e2a0077902509a6341

  • SHA1

    37c1298668832e191d26516986b64ffeb2d73cc9

  • SHA256

    4630cf46faf77194b5f3d2612d934b2531a2b6382b9902ae952945bffb7a1f6f

  • SHA512

    dbbe6468b7c821ddb5beefd6a20383c0f965d31c5f3260a220064f418af98399b71ce13fcd41d563899033ce023e39a826d5fd0892947875a7afb26bb21274a0

  • SSDEEP

    196608:tdO+J+ZyM+7ak7Tt9MAzHp/R3i1508RjpAfqOVjCda:tdfCyzrMAzHp/R3hYFtojCda

Malware Config

Targets

    • Target

      main.pyc

    • Size

      5KB

    • MD5

      31c28bfdc2473537e817198ea7cc061b

    • SHA1

      31ead0af32b568c37840ba35103fcf902d829976

    • SHA256

      27b8c6a5b42e34451e7373cf41ff3088db12b8e420a7ce45e80d57ebc912481d

    • SHA512

      bebea38cfee1a5309a8820dc9aa22165c45ac09a4711044ce935071ebb7df1dead39f330c8ca9c3fecca3a89e119416b11e4023941c4152952068b21c0ffb6a2

    • SSDEEP

      96:Tpzx87ZzTVAt/rZx3kNbOCPxYTHBArypCiU/UOCxE9/y:w051uQ+AvpA/iE0

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Component Object Model Hijacking

1
T1546.015

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Event Triggered Execution

1
T1546

Component Object Model Hijacking

1
T1546.015

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks