General

  • Target

    e027d58bfe8185600b5748f9f79a889e379fb51bc31ccbc43c46bd3429ce5b63

  • Size

    5.0MB

  • Sample

    240625-z83f6awhlr

  • MD5

    796acbff09c7c984e1ff39dbbd920d28

  • SHA1

    a0715959b67ddf4fd71d01111f8a515a054c1ba5

  • SHA256

    e027d58bfe8185600b5748f9f79a889e379fb51bc31ccbc43c46bd3429ce5b63

  • SHA512

    4e7a53542eff8806b7b708c6eef16ef34ecf48caf0f17b73843ccef4068f28d0f678b33d30244d78f1ecbe630b472b8cdb6ae16be990a605f54a034a8237e148

  • SSDEEP

    98304:fvbHGZpn+8vcAAGY36Vr/clxf59+XxRxy9rjT/xE95bPMMj0Qv4QBFnD:fvbGrcblxf59eRxypTpWVVjFfBF

Malware Config

Targets

    • Target

      e027d58bfe8185600b5748f9f79a889e379fb51bc31ccbc43c46bd3429ce5b63

    • Size

      5.0MB

    • MD5

      796acbff09c7c984e1ff39dbbd920d28

    • SHA1

      a0715959b67ddf4fd71d01111f8a515a054c1ba5

    • SHA256

      e027d58bfe8185600b5748f9f79a889e379fb51bc31ccbc43c46bd3429ce5b63

    • SHA512

      4e7a53542eff8806b7b708c6eef16ef34ecf48caf0f17b73843ccef4068f28d0f678b33d30244d78f1ecbe630b472b8cdb6ae16be990a605f54a034a8237e148

    • SSDEEP

      98304:fvbHGZpn+8vcAAGY36Vr/clxf59+XxRxy9rjT/xE95bPMMj0Qv4QBFnD:fvbGrcblxf59eRxypTpWVVjFfBF

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Deletes itself

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks