General

  • Target

    Рабочий стол.exe

  • Size

    11.3MB

  • Sample

    240525-znaweaaa4w

  • MD5

    bc4575a3ebd819e129153cd93605180f

  • SHA1

    0f366c788ccde441d672645761fa4fa083c3a171

  • SHA256

    11b93e34331790f9637d310f9a273582a1a6d57343f6f33db9fd857e8fca73df

  • SHA512

    da883ef545c81d7918c9a13a74afe418cbdbe6375a492622741c4ecbd18ed64a7bc41f5be11dc4fed64d15252cf4078be555c9b8e0003da3745e687b5d52e6f4

  • SSDEEP

    196608:PmbGyGFKQiBMlx9JBa+5py+snRqFSi9j/vrLNwqZbeVrfJQxYrPTrDiI7M:IVGFKQimlx9HhjqnRqweYPrPTij

Malware Config

Targets

    • Target

      Рабочий стол.exe

    • Size

      11.3MB

    • MD5

      bc4575a3ebd819e129153cd93605180f

    • SHA1

      0f366c788ccde441d672645761fa4fa083c3a171

    • SHA256

      11b93e34331790f9637d310f9a273582a1a6d57343f6f33db9fd857e8fca73df

    • SHA512

      da883ef545c81d7918c9a13a74afe418cbdbe6375a492622741c4ecbd18ed64a7bc41f5be11dc4fed64d15252cf4078be555c9b8e0003da3745e687b5d52e6f4

    • SSDEEP

      196608:PmbGyGFKQiBMlx9JBa+5py+snRqFSi9j/vrLNwqZbeVrfJQxYrPTrDiI7M:IVGFKQimlx9HhjqnRqweYPrPTij

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Registers COM server for autorun

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks