General

  • Target

    TopkaVisual (2.9).jar

  • Size

    639KB

  • Sample

    240703-frwshayenc

  • MD5

    7fa9a16379d07067a3eaada00bce21fc

  • SHA1

    fdef35aefa4ddcb283f953a97856164458a9cfa1

  • SHA256

    501bd65f0a2ae0c4378b898d7b5f74ed4d6400ee44adca4d3afe1e6710a6eb8a

  • SHA512

    b95dcdad9c15524de527041b49e2fcdb3e7197ad79436dfb8f17abff35a5bd5fa6eb66877971989fd93d0b0c9980f7f091fe57f82bc0a06cfbed322327bbb120

  • SSDEEP

    12288:Lf9AQK/Sg6Jsz4j4IAnngQ/lRH+96+NuJfgAZyRMt3Cu82tMStbDYA:LfOQ+qJs4kPngQfm/uJ4C/CuBtPtbDYA

Malware Config

Targets

    • Target

      TopkaVisual (2.9).jar

    • Size

      639KB

    • MD5

      7fa9a16379d07067a3eaada00bce21fc

    • SHA1

      fdef35aefa4ddcb283f953a97856164458a9cfa1

    • SHA256

      501bd65f0a2ae0c4378b898d7b5f74ed4d6400ee44adca4d3afe1e6710a6eb8a

    • SHA512

      b95dcdad9c15524de527041b49e2fcdb3e7197ad79436dfb8f17abff35a5bd5fa6eb66877971989fd93d0b0c9980f7f091fe57f82bc0a06cfbed322327bbb120

    • SSDEEP

      12288:Lf9AQK/Sg6Jsz4j4IAnngQ/lRH+96+NuJfgAZyRMt3Cu82tMStbDYA:LfOQ+qJs4kPngQfm/uJ4C/CuBtPtbDYA

    • Modifies file permissions

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks