General

  • Target

    sigmahacks0.2.exe

  • Size

    89KB

  • Sample

    240616-pa6e2ssfje

  • MD5

    5f0f7fa98655c618b7fb9bce8e01dca0

  • SHA1

    b13e2ec9f71f916b4934200901a1bd85a7e19423

  • SHA256

    68f7a4ce68d84bdde71cb6543d90e5e0e08602db22f9b6388d31876c601fac31

  • SHA512

    8c99f654d7e6a997861e3a6f01820836dc4e43bffed604e804fae06112d259f85658d1670709e5a7341d2f15ac00639f259eea724e6a618ac341bb9f9fd245d0

  • SSDEEP

    1536:T7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfiwiOp:P7DhdC6kzWypvaQ0FxyNTBfii

Malware Config

Targets

    • Target

      sigmahacks0.2.exe

    • Size

      89KB

    • MD5

      5f0f7fa98655c618b7fb9bce8e01dca0

    • SHA1

      b13e2ec9f71f916b4934200901a1bd85a7e19423

    • SHA256

      68f7a4ce68d84bdde71cb6543d90e5e0e08602db22f9b6388d31876c601fac31

    • SHA512

      8c99f654d7e6a997861e3a6f01820836dc4e43bffed604e804fae06112d259f85658d1670709e5a7341d2f15ac00639f259eea724e6a618ac341bb9f9fd245d0

    • SSDEEP

      1536:T7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfiwiOp:P7DhdC6kzWypvaQ0FxyNTBfii

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Registers COM server for autorun

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks