General

  • Target

    poo.jpeg

  • Size

    41KB

  • Sample

    231006-k9flfsce38

  • MD5

    8ae5c49ccc492d4d5cc29b3ef6caf3e8

  • SHA1

    20f6e547dce63676368e0415dc6f00737afb4d25

  • SHA256

    60e2f430ff554386740fffbb99f598a509215aaa334d07557b6a89981b6e70e9

  • SHA512

    fc2e39620437455b8c7fcd2dcb88a741071712244665b886f35a1a70d9c21d6152597b3e0292e06300c56db3e3955a14acbfd1c597082fa6ded25d82305a3929

  • SSDEEP

    768:ZH3gkFw5PEUqTJKnvLWjK0HWNbHS01HycQR6uWj44h2utPSakhxLgR:ZH3zw5yFWDwK0HWNbHB1HycQkLuutPSG

Malware Config

Targets

    • Target

      poo.jpeg

    • Size

      41KB

    • MD5

      8ae5c49ccc492d4d5cc29b3ef6caf3e8

    • SHA1

      20f6e547dce63676368e0415dc6f00737afb4d25

    • SHA256

      60e2f430ff554386740fffbb99f598a509215aaa334d07557b6a89981b6e70e9

    • SHA512

      fc2e39620437455b8c7fcd2dcb88a741071712244665b886f35a1a70d9c21d6152597b3e0292e06300c56db3e3955a14acbfd1c597082fa6ded25d82305a3929

    • SSDEEP

      768:ZH3gkFw5PEUqTJKnvLWjK0HWNbHS01HycQR6uWj44h2utPSakhxLgR:ZH3zw5yFWDwK0HWNbHB1HycQkLuutPSG

    • Downloads MZ/PE file

    • Sets file execution options in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Registers COM server for autorun

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks