General

  • Target

    sample

  • Size

    15KB

  • Sample

    240412-l76kjahe26

  • MD5

    177462f66e7efa0f38ba4353b6e179b6

  • SHA1

    d59f5f45461b28e77e84c44f5828d035bf8f4286

  • SHA256

    6e221f752f623d492d4aeb66718b4eb1e3a6408ab6f7bcd71e4e882a6d487744

  • SHA512

    39b22f691bc7be3db4b3ac0a55506ad4029e242f5951881ed2ab95177963f927c77f717df70cb248879a3c76f538d50b98f7d72dab7b4aeebafa7e95c6536c40

  • SSDEEP

    192:PNx5Ssv99qXoqTJkNr423ZPiipmAWyuxqSa0KfkYIBIwKflWTsCyEXN:5Ssl9qYoJkN0Jipmzy660KMYjtogEN

Malware Config

Targets

    • Target

      sample

    • Size

      15KB

    • MD5

      177462f66e7efa0f38ba4353b6e179b6

    • SHA1

      d59f5f45461b28e77e84c44f5828d035bf8f4286

    • SHA256

      6e221f752f623d492d4aeb66718b4eb1e3a6408ab6f7bcd71e4e882a6d487744

    • SHA512

      39b22f691bc7be3db4b3ac0a55506ad4029e242f5951881ed2ab95177963f927c77f717df70cb248879a3c76f538d50b98f7d72dab7b4aeebafa7e95c6536c40

    • SSDEEP

      192:PNx5Ssv99qXoqTJkNr423ZPiipmAWyuxqSa0KfkYIBIwKflWTsCyEXN:5Ssl9qYoJkN0Jipmzy660KMYjtogEN

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Registers COM server for autorun

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

4
T1082

Tasks