Resubmissions

02-07-2024 14:21

240702-rpd1fswfjg 10

02-07-2024 14:17

240702-rly68awejc 1

30-06-2024 11:06

240630-m7vzgawhlb 5

30-06-2024 11:02

240630-m45phazdqr 1

30-06-2024 10:28

240630-mhyn3aweng 8

30-06-2024 10:28

240630-mhvx6szbqm 1

30-06-2024 09:41

240630-lpaedawbne 1

29-06-2024 10:40

240629-mqs4jswbkg 10

29-06-2024 10:40

240629-mqnh3ayerk 4

29-06-2024 09:28

240629-lfc4xaxfrj 1

General

  • Target

    https://github.com

  • Sample

    240630-mhyn3aweng

Malware Config

Targets

    • Target

      https://github.com

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks