General
-
Target
video (1).webm
-
Size
15.1MB
-
Sample
240203-zsfbpacebj
-
MD5
87cd983fff8a16292a052e28cffde293
-
SHA1
f0dad32c35915372e3c3d9f82353ff6a85b97c79
-
SHA256
2851c16559111ead01b2c8f2b2733518ffdc58695fddbac70a0191c96cad622f
-
SHA512
e8ae9fcba4e4d5bb39822cda47fec08fc156a7cc4c121f4033c6b556128b0bf6ad95264605c6f9cc11a282c62d286301a5af37f4c991c4783e78aef7d56d1e14
-
SSDEEP
393216:KHwBkckuy2iLcbgmiTSdDz+zzPOHQKtITojmL8M6:swOb2iL5miTSdz+XSQKWSe8n
Static task
static1
Behavioral task
behavioral1
Sample
video (1).webm
Resource
win10-20231220-en
Malware Config
Targets
-
-
Target
video (1).webm
-
Size
15.1MB
-
MD5
87cd983fff8a16292a052e28cffde293
-
SHA1
f0dad32c35915372e3c3d9f82353ff6a85b97c79
-
SHA256
2851c16559111ead01b2c8f2b2733518ffdc58695fddbac70a0191c96cad622f
-
SHA512
e8ae9fcba4e4d5bb39822cda47fec08fc156a7cc4c121f4033c6b556128b0bf6ad95264605c6f9cc11a282c62d286301a5af37f4c991c4783e78aef7d56d1e14
-
SSDEEP
393216:KHwBkckuy2iLcbgmiTSdDz+zzPOHQKtITojmL8M6:swOb2iL5miTSdz+XSQKWSe8n
Score8/10-
Downloads MZ/PE file
-
Manipulates Digital Signatures
Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.
-
Modifies Installed Components in the registry
-
Sets file execution options in registry
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Registers COM server for autorun
-
Checks for any installed AV software in registry
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
1Windows Service
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Modify Registry
2