General

  • Target

    tinytask (1).ini

  • Size

    139B

  • Sample

    231115-2xks3see32

  • MD5

    638e04d61375269522f1839b3ec7465e

  • SHA1

    4b53b8465c08832758921720b1b77b722c4d6272

  • SHA256

    8f99d8b31d7699911b5df7eda4f510abb83e7b34d4b21de29bfac6375f394827

  • SHA512

    b930f910809694a76589d3e2ec1fc00ac98c4b4df170ae34916e476680abee1684a2e99dc400e698e62e61b73a501b51b1c9245557e26d6bde5c21dc7f4dc6dd

Malware Config

Targets

    • Target

      tinytask (1).ini

    • Size

      139B

    • MD5

      638e04d61375269522f1839b3ec7465e

    • SHA1

      4b53b8465c08832758921720b1b77b722c4d6272

    • SHA256

      8f99d8b31d7699911b5df7eda4f510abb83e7b34d4b21de29bfac6375f394827

    • SHA512

      b930f910809694a76589d3e2ec1fc00ac98c4b4df170ae34916e476680abee1684a2e99dc400e698e62e61b73a501b51b1c9245557e26d6bde5c21dc7f4dc6dd

    • Downloads MZ/PE file

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Registers COM server for autorun

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks