BUGHATCH Malware Analysis — Elastic Security Labs
Common Information
Type Value
UUID b2489494-a6c1-4267-b666-1ddecc3a29d2
Fingerprint adb4bd132da80493
Analysis status DONE
Considered CTI value 2
Text language
Published Sept. 9, 2022, midnight
Added to db Nov. 20, 2023, 12:58 a.m.
Last updated Nov. 18, 2024, 1:38 a.m.
Headline BUGHATCH Malware Analysis
Title BUGHATCH Malware Analysis — Elastic Security Labs
Detected Hints/Tags/Attributes 76/4/17
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 306 Elastic Security Labs https://www.elastic.co/security-labs/rss/feed.xml 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details File 2127
cmd.exe
Details File 1122
svchost.exe
Details File 127
c:\windows\system32\rundll32.exe
Details File 18
c:\windows\syswow64\rundll32.exe
Details File 4
agent32.bin
Details File 4
agent64.bin
Details File 1260
explorer.exe
Details File 15
explore.exe
Details File 1209
powershell.exe
Details File 2
temp%u.ps1
Details md5 1
A6E30CCF838569781703C943F18DC3F5
Details md5 1
9D9AD1251943ECACE81644A7AC320B3C
Details md5 1
B983B8EB258220628BE2A88CA44286B4
Details md5 1
39324A58D79FC5B8910CBD9AFBF1A6CB
Details sha256 1
f1325f8a55164e904a4b183186f44f815693a008a9445d2606215a232658c3cf
Details sha256 2
b495456a2239f3ba48e43ef295d6c00066473d6a7991051e1705a48746e8051f
Details Yara rule 1
rule Windows_Trojan_BUGHATCH {
	meta:
		author = "Elastic Security"
		creation_date = "2022-05-09"
		last_modified = "2022-06-09"
		license = "Elastic License v2"
		os = "Windows"
		arch = "x86"
		category_type = "Trojan"
		family = "BUGHATCH"
		threat_name = "Windows.Trojan.BUGHATCH"
		reference_sample = "b495456a2239f3ba48e43ef295d6c00066473d6a7991051e1705a48746e8051f"
	strings:
		$a1 = { 8B 45 ?? 33 D2 B9 A7 00 00 00 F7 F1 85 D2 75 ?? B8 01 00 00 00 EB 33 C0 }
		$a2 = { 8B 45 ?? 0F B7 48 04 81 F9 64 86 00 00 75 3B 8B 55 ?? 0F B7 42 16 25 00 20 00 00 ?? ?? B8 06 00 00 00 EB ?? }
		$a3 = { 69 4D 10 FD 43 03 00 81 C1 C3 9E 26 00 89 4D 10 8B 55 FC 8B 45 F8 0F B7 0C 50 8B 55 10 C1 EA 10 81 E2 FF FF 00 00 33 CA 8B 45 FC 8B 55 F8 66 89 0C 42 }
		$c1 = "-windowstyle hidden -executionpolicy bypass -file"
		$c2 = "C:\\Windows\\SysWOW64\\WindowsPowerShell\\v1.0\\powershell.exe"
		$c3 = "ReflectiveLoader"
		$c4 = "\\Sysnative\\"
		$c5 = "TEMP%u.CMD"
		$c6 = "TEMP%u.PS1"
		$c7 = "\\TEMP%d.%s"
		$c8 = "NtSetContextThread"
		$c9 = "NtResumeThread"
	condition:
		any of ($a*) or 6 of ($c*)
}