General

  • Target

    Java.msi

  • Size

    4.3MB

  • Sample

    210608-f3qabzp2la

  • MD5

    65455fe14bb0f3baa9d43c4cf2b421f7

  • SHA1

    08ba1973c2ad37142163d0f3067d12d26cf5ad61

  • SHA256

    0d245d45e6c96ffa4baf8b8be6cc7b0d15165b2398c420a9ad70788e7a1f88d7

  • SHA512

    6fb0c692eed60957b5da7edb4eb60a1693a86491b7f512e341ede7db2571717aeea152fd01b37c092f7ef8bf8d77900d7269537e8b60c9d793e0c9ac70d99bab

Malware Config

Targets

    • Target

      Java.msi

    • Size

      4.3MB

    • MD5

      65455fe14bb0f3baa9d43c4cf2b421f7

    • SHA1

      08ba1973c2ad37142163d0f3067d12d26cf5ad61

    • SHA256

      0d245d45e6c96ffa4baf8b8be6cc7b0d15165b2398c420a9ad70788e7a1f88d7

    • SHA512

      6fb0c692eed60957b5da7edb4eb60a1693a86491b7f512e341ede7db2571717aeea152fd01b37c092f7ef8bf8d77900d7269537e8b60c9d793e0c9ac70d99bab

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Possible privilege escalation attempt

    • Stops running service(s)

    • Loads dropped DLL

    • Modifies file permissions

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Impair Defenses

1
T1562

File Permissions Modification

1
T1222

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Impact

Service Stop

1
T1489

Tasks