General

  • Target

    u4wlg04us17.exe

  • Size

    33.0MB

  • Sample

    240604-yj6lvahe21

  • MD5

    610bc83987252bee72673b6dda434320

  • SHA1

    70940f50296d005257e5d0a6eb5268ec4272f3bd

  • SHA256

    3a45c99413503a1ac0f76c4f2d7440a4695813fe6e7f849b8e867509a621b306

  • SHA512

    da52015fd9b5e6d2fa357bd93a70005b6bc315d25674b16ead366a470a8da2ac26f99f969514b005ec11a1ed76cc0d089bc5646868941ed931152804928659e6

  • SSDEEP

    786432:THzSL7458aS6dOH7nMZya2xBZWB1kSz34IO1iNhp9PsODGo:TTSLkfyaUPWjfO12Psg

Score
8/10

Malware Config

Targets

    • Target

      u4wlg04us17.exe

    • Size

      33.0MB

    • MD5

      610bc83987252bee72673b6dda434320

    • SHA1

      70940f50296d005257e5d0a6eb5268ec4272f3bd

    • SHA256

      3a45c99413503a1ac0f76c4f2d7440a4695813fe6e7f849b8e867509a621b306

    • SHA512

      da52015fd9b5e6d2fa357bd93a70005b6bc315d25674b16ead366a470a8da2ac26f99f969514b005ec11a1ed76cc0d089bc5646868941ed931152804928659e6

    • SSDEEP

      786432:THzSL7458aS6dOH7nMZya2xBZWB1kSz34IO1iNhp9PsODGo:TTSLkfyaUPWjfO12Psg

    Score
    8/10
    • Drops file in Drivers directory

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks