General

  • Target

    empyrean-main.zip

  • Size

    458KB

  • Sample

    240627-v52m8ssbnd

  • MD5

    6535abdad3ba947fa280b8d5f836751b

  • SHA1

    5c7d20d35bcd2049fea5c07ad4d83e4e0e2fb494

  • SHA256

    15f5346f636fa7879882f23611d46da7d7fab3e03cf75366f8721fe54804f8fd

  • SHA512

    5edc1bac7c636d2488578d97544cedd18f61124f2a732b49ffd891aeac00a19af6dc4c42e8e4c9e52f5ae0e908f059219f0ceae698d9084453335877bea132a1

  • SSDEEP

    12288:oHl1OgPc6NQpZZbzYQqKevezSE3l52fsl:oH26CpZNUvezH52w

Malware Config

Targets

    • Target

      empyrean-main.zip

    • Size

      458KB

    • MD5

      6535abdad3ba947fa280b8d5f836751b

    • SHA1

      5c7d20d35bcd2049fea5c07ad4d83e4e0e2fb494

    • SHA256

      15f5346f636fa7879882f23611d46da7d7fab3e03cf75366f8721fe54804f8fd

    • SHA512

      5edc1bac7c636d2488578d97544cedd18f61124f2a732b49ffd891aeac00a19af6dc4c42e8e4c9e52f5ae0e908f059219f0ceae698d9084453335877bea132a1

    • SSDEEP

      12288:oHl1OgPc6NQpZZbzYQqKevezSE3l52fsl:oH26CpZNUvezH52w

    Score
    1/10
    • Target

      empyrean-main/install_python.bat

    • Size

      686B

    • MD5

      f30718a354e7cc104ea553ce5ae2d486

    • SHA1

      3876134e6b92da57a49d868013ed35b5d946f8fd

    • SHA256

      94008c8135d149fecd29ca62aded487f0fbfa6af893596ffc3e4b621a0fe4966

    • SHA512

      601b2256ea709a885741f1dec5c97dda6fb7fd4e485b4afac3503af1aefe73472e5bc5529c144814a3defbc0b51ac4b50e02a50dccc69b41ee5d87a3f4282874

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks