General
-
Target
sample
-
Size
19KB
-
Sample
240513-katc9sfc35
-
MD5
9867b5c84e87d27e746285a51b1eb786
-
SHA1
2a608544a219281519aaa49cb48d38b8fc5af99b
-
SHA256
63e3d586de3cedcda782610ac283ab67cf1222f791d0897dbe39afe9c3524721
-
SHA512
f76d6363375c65350d1f9faf5a347e97d0f8b03358672c906b923ef8e3bc6a452ad1075749e9fe4a30402ed2fe648d1635ec05a64790a14f0020861bde23e7a2
-
SSDEEP
384:rZZ7IDpmReVoOs4ai9ylKeGMAU8Hhhbs227XPo2paWhOwob0Jn+JIJCgMmVn:rX7IBVoOs4amyI1MKBhbHoXOWhOwob0p
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
sample
-
Size
19KB
-
MD5
9867b5c84e87d27e746285a51b1eb786
-
SHA1
2a608544a219281519aaa49cb48d38b8fc5af99b
-
SHA256
63e3d586de3cedcda782610ac283ab67cf1222f791d0897dbe39afe9c3524721
-
SHA512
f76d6363375c65350d1f9faf5a347e97d0f8b03358672c906b923ef8e3bc6a452ad1075749e9fe4a30402ed2fe648d1635ec05a64790a14f0020861bde23e7a2
-
SSDEEP
384:rZZ7IDpmReVoOs4ai9ylKeGMAU8Hhhbs227XPo2paWhOwob0Jn+JIJCgMmVn:rX7IBVoOs4amyI1MKBhbHoXOWhOwob0p
Score10/10-
Modifies WinLogon for persistence
-
Disables RegEdit via registry modification
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1