General

  • Target

    Exm_Premium_Utility_0.95_1_1.bat

  • Size

    661KB

  • Sample

    240212-y5ys5adc59

  • MD5

    73381d44050ec2fbcecbfc9a6bfb0bb3

  • SHA1

    578bc26c2da8d5cd30732a977f3cbf0eecda168a

  • SHA256

    7566d9f5bdbaf8073179d794ebb920dcdd02f249d4e46ea062e8315532ceca51

  • SHA512

    31552773c791f925c009292f7ebc27e768ed2c94809c11048756593e4f9598bd72d6f37648978caadce9293eb0f789d05eb4234d6dcbcbbafc57a0f4142009d8

  • SSDEEP

    3072:FDGzQbmbkAqA2xH7VkKEn14IZVvisLur+K3:FDGiVNEn14IZVvisL43

Malware Config

Targets

    • Target

      Exm_Premium_Utility_0.95_1_1.bat

    • Size

      661KB

    • MD5

      73381d44050ec2fbcecbfc9a6bfb0bb3

    • SHA1

      578bc26c2da8d5cd30732a977f3cbf0eecda168a

    • SHA256

      7566d9f5bdbaf8073179d794ebb920dcdd02f249d4e46ea062e8315532ceca51

    • SHA512

      31552773c791f925c009292f7ebc27e768ed2c94809c11048756593e4f9598bd72d6f37648978caadce9293eb0f789d05eb4234d6dcbcbbafc57a0f4142009d8

    • SSDEEP

      3072:FDGzQbmbkAqA2xH7VkKEn14IZVvisLur+K3:FDGiVNEn14IZVvisL43

    • UAC bypass

    • Disables taskbar notifications via registry modification

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks