ID | X0009 |
Type | Bot/Botnet (click-fraud), Trojan |
Aliases | None |
Platforms | Windows |
Year | 2016 |
Associated ATT&CK Software | None |
A trojan that performs click-fraud.
Name | Use |
---|---|
Initial Access::Phishing::Spearphishing Attachment (T1566.001) | The malware is sent out to victims via an attachment. [2] |
Execution::User Execution::Malicious File (T1204.002) | The malware relies on a victim to execute itself. [2] |
Defense Evasion::System Binary Proxy Execution::Mshta (T1218.005) | The malware uses mshta.exe to run Javascript. [1] |
Defense Evasion::File and Directory Permissions Modification (T1222) | Kovter sets file attributes. [3] |
Discovery::Application Window Discovery (T1010) | Kovter finds graphical windows. [3] |
Discovery::System Location Discovery (T1614) | Kovter gets geographical locations. [3] |
Execution::Shared Modules (T1129) | Kovter gets ntdll base address. [3] |
Execution::System Services::Service Execution (T1569.002) | Kovter interacts with drivers via control codes. [3] |
SHA256 Hashes
- 15c237f6b74af2588b07912bf18e2734594251787871c9638104e4bf5de46589
- bffe7ccbcf69e7c787ff10d1dc7dbf6044bffcb13b95d851f4a735917b3a6fdf
- 40050153dceec2c8fbb1912f8eeabe449d1e265f0c8198008be8b34e5403e731
[1] https://blog.malwarebytes.com/threat-analysis/2016/07/untangling-kovter/
[2] https://labs.vipre.com/analysis-of-kovter-a-very-clever-piece-of-malware/#:~:text=Kovter%20copies%20the%20fileless%20persistence,written%20on%20to%20the%20filesystem.
[3] capa v4.0, analyzed at MITRE on 10/12/2022