General

  • Target

    download.jpeg

  • Size

    4KB

  • Sample

    230513-w448eagh94

  • MD5

    0a49cf62527108fe0e5a004bd77c82c9

  • SHA1

    73b6d43f0aa871d24a9266e1c6f234fb9f533f53

  • SHA256

    4a0e60744a38203321017c18ac27b19cb99b588229daf735db67a2839a6ba128

  • SHA512

    ce729be4f9bf703decb3d98f39cf061d310e153eafdb6447697437bae8873a1f004ec654d7633e0bb152ea1437cbaa59034ab0f29623ba1e6f82ac05eff38aaf

  • SSDEEP

    96:CN39ZLBa18r6YJqhEZ8lB9hJKX3ijHbE08TafvlkNiw9EnaXYd+O:efFaRQGlP7w3ijHA0aivlAFeoYkO

Malware Config

Targets

    • Target

      download.jpeg

    • Size

      4KB

    • MD5

      0a49cf62527108fe0e5a004bd77c82c9

    • SHA1

      73b6d43f0aa871d24a9266e1c6f234fb9f533f53

    • SHA256

      4a0e60744a38203321017c18ac27b19cb99b588229daf735db67a2839a6ba128

    • SHA512

      ce729be4f9bf703decb3d98f39cf061d310e153eafdb6447697437bae8873a1f004ec654d7633e0bb152ea1437cbaa59034ab0f29623ba1e6f82ac05eff38aaf

    • SSDEEP

      96:CN39ZLBa18r6YJqhEZ8lB9hJKX3ijHbE08TafvlkNiw9EnaXYd+O:efFaRQGlP7w3ijHA0aivlAFeoYkO

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Registers COM server for autorun

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks