General

  • Target

    240522-t14flahc41-behavioral1.pcap

  • Size

    6.5MB

  • Sample

    240522-t91fashe8t

  • MD5

    c719628113586541710931c2a0daad28

  • SHA1

    3d30ebc75dc3e5f4d17841e9eadf20565d878b5b

  • SHA256

    9ad9f21ec1538978e896317756689c1b02b84d645a2f7c9c05416a7d2033b3ab

  • SHA512

    6f852f8276bed2743de85ca3583179061747bf31459dd53984871d25844c6b03ffa3ff9d227afe526621accd936cbc8f66d69745f11b52653c6bc46d23287f2d

  • SSDEEP

    98304:pgmP+J5+GBoKNxTbSww87tjM76kGQxfC+lcWZ+XnRojo7V/UuUrudMsS6vA4uuLT:/Ps3GmnFToNWG+3dB/UptOA4uYY2

Malware Config

Targets

    • Target

      240522-t14flahc41-behavioral1.pcap

    • Size

      6.5MB

    • MD5

      c719628113586541710931c2a0daad28

    • SHA1

      3d30ebc75dc3e5f4d17841e9eadf20565d878b5b

    • SHA256

      9ad9f21ec1538978e896317756689c1b02b84d645a2f7c9c05416a7d2033b3ab

    • SHA512

      6f852f8276bed2743de85ca3583179061747bf31459dd53984871d25844c6b03ffa3ff9d227afe526621accd936cbc8f66d69745f11b52653c6bc46d23287f2d

    • SSDEEP

      98304:pgmP+J5+GBoKNxTbSww87tjM76kGQxfC+lcWZ+XnRojo7V/UuUrudMsS6vA4uuLT:/Ps3GmnFToNWG+3dB/UptOA4uYY2

    • Disables Task Manager via registry modification

    • Modifies Installed Components in the registry

    • Possible privilege escalation attempt

    • Executes dropped EXE

    • Modifies file permissions

    • Modifies system executable filetype association

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Defense Evasion

Modify Registry

3
T1112

File and Directory Permissions Modification

1
T1222

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

4
T1082

Command and Control

Web Service

1
T1102

Tasks