General

  • Target

    e33030a546ac89728c4a0937b9069fcac2b59f4b7d909eb23ee667c92cfe264d

  • Size

    44KB

  • Sample

    221028-31788acfh2

  • MD5

    0b81691bc9068c23e02d66ce868ed031

  • SHA1

    a7219761cb5bdfc8cd87627ec05bd83dce5d60cd

  • SHA256

    e33030a546ac89728c4a0937b9069fcac2b59f4b7d909eb23ee667c92cfe264d

  • SHA512

    52df1b7e518e15bfcf691fb3053a4f34ecab150bf91a181dc1bbe628fe6329a06e6ed9f2cf5dd85754fbf0be67cd311fb47405dc06bbab60b727a1d607655467

  • SSDEEP

    768:uPt+T7sF9MIgMVsywpS66KyqBD9jDozEOXAe:+mYySWB6Ae

Malware Config

Targets

    • Target

      e33030a546ac89728c4a0937b9069fcac2b59f4b7d909eb23ee667c92cfe264d

    • Size

      44KB

    • MD5

      0b81691bc9068c23e02d66ce868ed031

    • SHA1

      a7219761cb5bdfc8cd87627ec05bd83dce5d60cd

    • SHA256

      e33030a546ac89728c4a0937b9069fcac2b59f4b7d909eb23ee667c92cfe264d

    • SHA512

      52df1b7e518e15bfcf691fb3053a4f34ecab150bf91a181dc1bbe628fe6329a06e6ed9f2cf5dd85754fbf0be67cd311fb47405dc06bbab60b727a1d607655467

    • SSDEEP

      768:uPt+T7sF9MIgMVsywpS66KyqBD9jDozEOXAe:+mYySWB6Ae

    • Possible privilege escalation attempt

    • Modifies file permissions

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Permissions Modification

1
T1222

Modify Registry

1
T1112

Tasks