General

  • Target

    c09ec616bdd3b454e607dee957243027

  • Size

    224KB

  • Sample

    240311-py2rrsfb78

  • MD5

    c09ec616bdd3b454e607dee957243027

  • SHA1

    edbddf690c2eef6b8155bb2c1e4fee911f82b82d

  • SHA256

    e98830947bffaf5a8456320794c589e6e59e2797871526c23ff63d0a6685d900

  • SHA512

    f9d8b8dc36f91e674db95bd4f511eab8b2238251e767ed89843a75c1cc52acb876c076860148c75f4a347d6c31b3e851d0a88007ae16778fcea05aa98a652f9a

  • SSDEEP

    3072:PZH+Nn351N+RlNkHK3w4KEJ7oc6TFbijsxKxjaR9VBi98exyNTWibSyeeXI5Xr:RHInbs173wfksKxOR5i/T04eXIZ

Malware Config

Targets

    • Target

      c09ec616bdd3b454e607dee957243027

    • Size

      224KB

    • MD5

      c09ec616bdd3b454e607dee957243027

    • SHA1

      edbddf690c2eef6b8155bb2c1e4fee911f82b82d

    • SHA256

      e98830947bffaf5a8456320794c589e6e59e2797871526c23ff63d0a6685d900

    • SHA512

      f9d8b8dc36f91e674db95bd4f511eab8b2238251e767ed89843a75c1cc52acb876c076860148c75f4a347d6c31b3e851d0a88007ae16778fcea05aa98a652f9a

    • SSDEEP

      3072:PZH+Nn351N+RlNkHK3w4KEJ7oc6TFbijsxKxjaR9VBi98exyNTWibSyeeXI5Xr:RHInbs173wfksKxOR5i/T04eXIZ

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials in Registry

1
T1552.002

Collection

Data from Local System

1
T1005

Tasks