General

  • Target

    logger.py

  • Size

    1KB

  • Sample

    240220-cg9d3ahc7t

  • MD5

    23be5a96267554695b19934f71f759ea

  • SHA1

    3e46c4eb8bf5604c246821b25c588136c3de34b7

  • SHA256

    45093d1b0708012ab39786b79122fc62c1d1c31bb05d5c521e36278dd6c46dcb

  • SHA512

    cf2d59cdad1f4bfe1c2396a7933d097b488d7f992bdbaafb5f9d50f9f908eb8f913fa2589c633384f870921fab09f4f4382d26ab2033c4e84f9b826cff67388a

Malware Config

Targets

    • Target

      logger.py

    • Size

      1KB

    • MD5

      23be5a96267554695b19934f71f759ea

    • SHA1

      3e46c4eb8bf5604c246821b25c588136c3de34b7

    • SHA256

      45093d1b0708012ab39786b79122fc62c1d1c31bb05d5c521e36278dd6c46dcb

    • SHA512

      cf2d59cdad1f4bfe1c2396a7933d097b488d7f992bdbaafb5f9d50f9f908eb8f913fa2589c633384f870921fab09f4f4382d26ab2033c4e84f9b826cff67388a

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Registers COM server for autorun

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks