Resubmissions

15-02-2023 19:41

230215-yebwnsdd2y 8

15-02-2023 19:01

230215-xpdmksdd94 8

General

  • Target

    Python_3-11.msi

  • Size

    126.5MB

  • Sample

    230215-yebwnsdd2y

  • MD5

    7f08a6950ed0768c66d8b52fcb85db41

  • SHA1

    882b7b24befce5d8d9ebfd737435fdaa301e0856

  • SHA256

    8fac57e87af9eef9dd5d75cc90171615cb18bc2cb791afaaed77f5755021f993

  • SHA512

    90997cb57b53da2f111c0db6257f89c40cccd089288d5343b1417dd1b58b1c857e42159fd445aa8d9763b6b99512a3afb8b9a5aef0b91e70a169424e1920eae7

  • SSDEEP

    3145728:m8VJ3Q74esPAYyTv7JkzLp/G/H2P5LLgjBujtTlBjqnH754hu:m8kcC7JCaIL9TlWou

Malware Config

Targets

    • Target

      Python_3-11.msi

    • Size

      126.5MB

    • MD5

      7f08a6950ed0768c66d8b52fcb85db41

    • SHA1

      882b7b24befce5d8d9ebfd737435fdaa301e0856

    • SHA256

      8fac57e87af9eef9dd5d75cc90171615cb18bc2cb791afaaed77f5755021f993

    • SHA512

      90997cb57b53da2f111c0db6257f89c40cccd089288d5343b1417dd1b58b1c857e42159fd445aa8d9763b6b99512a3afb8b9a5aef0b91e70a169424e1920eae7

    • SSDEEP

      3145728:m8VJ3Q74esPAYyTv7JkzLp/G/H2P5LLgjBujtTlBjqnH754hu:m8kcC7JCaIL9TlWou

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks