General
-
Target
$RELPZ36.exe
-
Size
5.7MB
-
Sample
240428-y4bbfage7v
-
MD5
c9d3653b2b612ba6087767ca6972289d
-
SHA1
55716813bec9dd2377e2f4c2bc3457a1ebf1f982
-
SHA256
98a9b281a537b5cc033913c26b3e649bba6aa26a2baa60c51e679b11b0f15efe
-
SHA512
458f51d756a829e09a35fdb56b515110584d78dbda44246541a20c08254f36ed6fe79390da0b4abe99cc68e489300d36bbaee70953c90930d4f3540ccffb9d26
-
SSDEEP
98304:x0NFx6666666666666666666666666666666x666666666666666fwwwwwwwwww2:YdUcT+ApWkdjQgmg7Ynn30jpKca6iPdz
Static task
static1
Behavioral task
behavioral1
Sample
$RELPZ36.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
$RELPZ36.exe
-
Size
5.7MB
-
MD5
c9d3653b2b612ba6087767ca6972289d
-
SHA1
55716813bec9dd2377e2f4c2bc3457a1ebf1f982
-
SHA256
98a9b281a537b5cc033913c26b3e649bba6aa26a2baa60c51e679b11b0f15efe
-
SHA512
458f51d756a829e09a35fdb56b515110584d78dbda44246541a20c08254f36ed6fe79390da0b4abe99cc68e489300d36bbaee70953c90930d4f3540ccffb9d26
-
SSDEEP
98304:x0NFx6666666666666666666666666666666x666666666666666fwwwwwwwwww2:YdUcT+ApWkdjQgmg7Ynn30jpKca6iPdz
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Registers COM server for autorun
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Event Triggered Execution
1Change Default File Association
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Privilege Escalation
Event Triggered Execution
1Change Default File Association
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1