Skip to content

Latest commit

 

History

History
67 lines (50 loc) · 2.61 KB

kovter.md

File metadata and controls

67 lines (50 loc) · 2.61 KB
ID X0009
Aliases None
Platforms Windows
Year 2016
Associated ATT&CK Software None

Kovter

A trojan that performs click-fraud.

ATT&CK Techniques

Name Use
Initial Access::Phishing::Spearphishing Attachment (T1566.001) The malware is sent out to victims via an attachment [2]
Execution::User Execution::Malicious File (T1204.002) The malware relies on a victim to execute itself [2]
Defense Evasion::System Binary Proxy Execution::Mshta (T1218.005) The malware uses mshta.exe to run Javascript [1]

Enhanced ATT&CK Techniques

Name Use
Impact::Generate Traffic from Victim (E1643) Performs click-fraud. [1]
Persistence::Registry Run Keys / Startup Folder (F0012) The malware writes an autorun registry entry [2]
Execution::Command and Scripting Interpreter (E1059) The malware executes malicious javascript and powershell [1]
Defense Evasion::Modify Registry (E1112) The malware modifies the registry during execution [2]
Defense Evasion::Obfuscated Files or Information (E1027) The malware will use a key to decrypt text from a URL to create more malicious code [1]
Anti-Static Analysis::Software Packing (F0001) The malware comes packed by a crypter/FUD [1]

MBC Behaviors

Name Use
Defense Evasion::Alternative Installation Location::Registry Install (B0027.002) Stores malware files in the Registry instead of the hard drive [2]

Indicators of Compromise

SHA256 Hashes

  • 15c237f6b74af2588b07912bf18e2734594251787871c9638104e4bf5de46589
  • bffe7ccbcf69e7c787ff10d1dc7dbf6044bffcb13b95d851f4a735917b3a6fdf

References

[1] https://blog.malwarebytes.com/threat-analysis/2016/07/untangling-kovter/

[2] https://labs.vipre.com/analysis-of-kovter-a-very-clever-piece-of-malware/#:~:text=Kovter%20copies%20the%20fileless%20persistence,written%20on%20to%20the%20filesystem.