General

  • Target

    IMG_342_online-video-cutter.com_1.mp4

  • Size

    1.2MB

  • Sample

    240624-xttjla1erq

  • MD5

    ecefb5d20e8487156191ff586bc1f3e4

  • SHA1

    edf16117a22fcb3e9140667b08f5cc00b8a983b0

  • SHA256

    81f27467fe8d443c2cf2c9719e469414740c8f59382d1301773e427c8a214c86

  • SHA512

    237037fcb543aa660346d3fcc9e3a707a408009efdeb7fcc36bf4617200a2a77fcc4499d7a5b27baea12da6734c2a63522cc17943ebb420d4d09c3e9e21335a3

  • SSDEEP

    24576:1Ok80xWUZI2Ss8rvXDo4S37kpSBlsPUqZ93jpz1Hre8EGqPxKJIO/:1b8evuvXDoj2Ss5N1HrhEGqPEJt/

Score
8/10

Malware Config

Targets

    • Target

      IMG_342_online-video-cutter.com_1.mp4

    • Size

      1.2MB

    • MD5

      ecefb5d20e8487156191ff586bc1f3e4

    • SHA1

      edf16117a22fcb3e9140667b08f5cc00b8a983b0

    • SHA256

      81f27467fe8d443c2cf2c9719e469414740c8f59382d1301773e427c8a214c86

    • SHA512

      237037fcb543aa660346d3fcc9e3a707a408009efdeb7fcc36bf4617200a2a77fcc4499d7a5b27baea12da6734c2a63522cc17943ebb420d4d09c3e9e21335a3

    • SSDEEP

      24576:1Ok80xWUZI2Ss8rvXDo4S37kpSBlsPUqZ93jpz1Hre8EGqPxKJIO/:1b8evuvXDoj2Ss5N1HrhEGqPEJt/

    Score
    8/10
    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks