General

  • Target

    r3QRVAoL

  • Size

    2KB

  • Sample

    230522-waxlgabg38

  • MD5

    68a0551225a2df68d0ed12011f892342

  • SHA1

    59b1ed9f33191dae9833f016ea0f6cf6ba962b78

  • SHA256

    bc9f2c161f77cebe74c42a14b099bd2bedb2d89de7595388c07c168eaa3a2208

  • SHA512

    d67709d14d235dbb7857683b7705095758295dc01039470c006a7ed1a914179adada4245f8adac87d85f8ea43b6d03a2f8c3ca0786c38a9082e875d9c7a02b04

Malware Config

Targets

    • Target

      r3QRVAoL

    • Size

      2KB

    • MD5

      68a0551225a2df68d0ed12011f892342

    • SHA1

      59b1ed9f33191dae9833f016ea0f6cf6ba962b78

    • SHA256

      bc9f2c161f77cebe74c42a14b099bd2bedb2d89de7595388c07c168eaa3a2208

    • SHA512

      d67709d14d235dbb7857683b7705095758295dc01039470c006a7ed1a914179adada4245f8adac87d85f8ea43b6d03a2f8c3ca0786c38a9082e875d9c7a02b04

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks