General

  • Target

    main.py

  • Size

    6KB

  • Sample

    240408-phwktacc41

  • MD5

    78fb568e91f2d1df429d2b3bc07ebe0d

  • SHA1

    fd514858dfb76295c6098dc3dee964223db39b7c

  • SHA256

    faee5fdcad30f9f2ac56aaf07613de9b9f2981d37fd5000b7083635e9aaebb17

  • SHA512

    3e21519802c78b3f7ffdc20f64c8a4a52e3adb117cf7621b2baee5b9c05d3a083f7ea681e66a7cbbdb4ef46be3c1da9c3131057d17801ba6e8f2f086962480da

  • SSDEEP

    192:vtZM2zZ2zkuwXvC3KOz2KUz9gfT+d2z9yp2a:lZzQJev5OK/6CIhyUa

Malware Config

Targets

    • Target

      main.py

    • Size

      6KB

    • MD5

      78fb568e91f2d1df429d2b3bc07ebe0d

    • SHA1

      fd514858dfb76295c6098dc3dee964223db39b7c

    • SHA256

      faee5fdcad30f9f2ac56aaf07613de9b9f2981d37fd5000b7083635e9aaebb17

    • SHA512

      3e21519802c78b3f7ffdc20f64c8a4a52e3adb117cf7621b2baee5b9c05d3a083f7ea681e66a7cbbdb4ef46be3c1da9c3131057d17801ba6e8f2f086962480da

    • SSDEEP

      192:vtZM2zZ2zkuwXvC3KOz2KUz9gfT+d2z9yp2a:lZzQJev5OK/6CIhyUa

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Registers COM server for autorun

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks