General
-
Target
3d854a29c35902e2ef8ad796f7b62108.bin
-
Size
1.6MB
-
Sample
231026-bvewyabc3y
-
MD5
6679b8f4c01d64d1fb9e98b16554aa15
-
SHA1
b5d71a254323d4746eb02d587266e4cc205a3969
-
SHA256
796199ec3ddd4946a86bb2373fedc9f6b40bfa564eeb8396cd48cd1b8113cded
-
SHA512
38126692dbc035df185a3464eaa8d73af50fb8335a47e16f339e66d6a30cad4bd929955bf00af42a23adc0f1ec5efb471e673383ad8a9bf3729b9bf808199957
-
SSDEEP
24576:3twDNWhyFdqwY6QYbCDLXslMSF2KT6gaF5Vq+oxLWSCdPLRay2sBsPAXRJXRAAh5:3KDAsFdo6Q0MXslMSv6dMzWdDDlAaxfX
Static task
static1
Behavioral task
behavioral1
Sample
mtk.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
mtk.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
amadey
2.03
-
install_dir
3101f8f780
-
install_file
gbudn.exe
-
strings_key
98efc0765f4c223e79368db4c8650353
Targets
-
-
Target
mtk.exe
-
Size
4.0MB
-
MD5
0dbaff61a0d7eb35c23542fe980c8e30
-
SHA1
a65bce229a1f0143c6f5c86a205da15d74652335
-
SHA256
0771ddc1515150cf7bb2eaed7ce17db58bf1f3f963ec60b28e29266763c92594
-
SHA512
d59cc95efbb06b98b32ab0f52596aad4cf8b72a2390cddee8237301ee284995421fe98aff13a967db34d49759feaeac51f76e23d4d49397ef81fb003075adfc7
-
SSDEEP
49152:5hkVUncRtu1kPxXzEgDH/0nl0efk6e4Ath5+hY7hYKJ+NFK2Z0N/eEDNIGuWFlva:qxJDhlEF0N/e06Wrghxt
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
StrongPity
StrongPity is a spyware developed by PROMETHIUM APT group mainly used in government sponsored attacks.
-
StrongPity Spyware
-
Modifies boot configuration data using bcdedit
-
mimikatz is an open source tool to dump credentials on Windows
-
Executes dropped EXE
-
Loads dropped DLL
-
Winexe tool used by Sofacy APT in several incidents
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1