Resubmissions

05/07/2024, 13:28

240705-qqzg4sygmm 8

05/07/2024, 13:24

240705-qnc64ayfrk 8

General

  • Target

    loader.exe

  • Size

    14.3MB

  • Sample

    240705-qnc64ayfrk

  • MD5

    abcf10d799268fe2583915def8bc40d6

  • SHA1

    7ed492e40499c2c5cf3b5b0286ad16b743dcb27f

  • SHA256

    0bfa52c77ec71cca4dcda293482e5d5917f92f5219cbc52bc7aff30ee6cca3f3

  • SHA512

    e7afb50d851914f7e9d89c03ba24f2a7d0fcab90258d975bd485050f2cca87338141719cc3741293237570b443e5de724a96407e57114257465abb575d607003

  • SSDEEP

    196608:urCkQo6RyNCgDkMFhv7rJ15IiAeM2EmVDh5rd0q7rzI83wEnHt0NWklylyHL:SCZTEDkA97rJ1eiAUEwDnmqjIn0qy

Malware Config

Targets

    • Target

      loader.exe

    • Size

      14.3MB

    • MD5

      abcf10d799268fe2583915def8bc40d6

    • SHA1

      7ed492e40499c2c5cf3b5b0286ad16b743dcb27f

    • SHA256

      0bfa52c77ec71cca4dcda293482e5d5917f92f5219cbc52bc7aff30ee6cca3f3

    • SHA512

      e7afb50d851914f7e9d89c03ba24f2a7d0fcab90258d975bd485050f2cca87338141719cc3741293237570b443e5de724a96407e57114257465abb575d607003

    • SSDEEP

      196608:urCkQo6RyNCgDkMFhv7rJ15IiAeM2EmVDh5rd0q7rzI83wEnHt0NWklylyHL:SCZTEDkA97rJ1eiAUEwDnmqjIn0qy

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks