Resubmissions

16-09-2021 04:18

210916-ew37psehdl 8

08-06-2021 15:32

210608-l4es4wqfv6 10

General

  • Target

    Java.msi

  • Size

    4.3MB

  • Sample

    210916-ew37psehdl

  • MD5

    65455fe14bb0f3baa9d43c4cf2b421f7

  • SHA1

    08ba1973c2ad37142163d0f3067d12d26cf5ad61

  • SHA256

    0d245d45e6c96ffa4baf8b8be6cc7b0d15165b2398c420a9ad70788e7a1f88d7

  • SHA512

    6fb0c692eed60957b5da7edb4eb60a1693a86491b7f512e341ede7db2571717aeea152fd01b37c092f7ef8bf8d77900d7269537e8b60c9d793e0c9ac70d99bab

Score
8/10

Malware Config

Targets

    • Target

      Java.msi

    • Size

      4.3MB

    • MD5

      65455fe14bb0f3baa9d43c4cf2b421f7

    • SHA1

      08ba1973c2ad37142163d0f3067d12d26cf5ad61

    • SHA256

      0d245d45e6c96ffa4baf8b8be6cc7b0d15165b2398c420a9ad70788e7a1f88d7

    • SHA512

      6fb0c692eed60957b5da7edb4eb60a1693a86491b7f512e341ede7db2571717aeea152fd01b37c092f7ef8bf8d77900d7269537e8b60c9d793e0c9ac70d99bab

    Score
    8/10
    • Blocklisted process makes network request

    • Executes dropped EXE

    • Possible privilege escalation attempt

    • Loads dropped DLL

    • Modifies file permissions

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Permissions Modification

1
T1222

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks