General

  • Target

    1.txt

  • Size

    4KB

  • Sample

    240519-cnf14add49

  • MD5

    85e80563d3606cfcfc510f380479b842

  • SHA1

    2d57015ade77beffde597e767b869c766b26b951

  • SHA256

    640c7cd20d50be65a4248a008843e624b22570a4b96031ec9226eeb64d249378

  • SHA512

    ff80ccb5e199d4a3f18c35c138bcc91812d03bb957e6aff197d079cfdf5f29d3b45cd32772476b48e3f017219f2237864bbee05fe874e9ef1abb97d27161550e

  • SSDEEP

    96:fYemN8r9f4PPfMSHnx2gqoij8RW8kJt0b:fYerZgX7y4b

Malware Config

Targets

    • Target

      1.txt

    • Size

      4KB

    • MD5

      85e80563d3606cfcfc510f380479b842

    • SHA1

      2d57015ade77beffde597e767b869c766b26b951

    • SHA256

      640c7cd20d50be65a4248a008843e624b22570a4b96031ec9226eeb64d249378

    • SHA512

      ff80ccb5e199d4a3f18c35c138bcc91812d03bb957e6aff197d079cfdf5f29d3b45cd32772476b48e3f017219f2237864bbee05fe874e9ef1abb97d27161550e

    • SSDEEP

      96:fYemN8r9f4PPfMSHnx2gqoij8RW8kJt0b:fYerZgX7y4b

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Defense Evasion

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

2
T1562

Disable or Modify Tools

1
T1562.001

Disable or Modify System Firewall

1
T1562.004

Modify Registry

1
T1112

File and Directory Permissions Modification

1
T1222

Discovery

System Information Discovery

3
T1082

Query Registry

1
T1012

Tasks