General

  • Target

    sample

  • Size

    19KB

  • Sample

    240707-wj35lsycja

  • MD5

    69ef79397fa0aa72de8c4371012a3525

  • SHA1

    0c9dddb9b6ddefa16cccf7af1168a524b0057913

  • SHA256

    748415008bed7e4d275e94b2f8c518494f5992ccf6e383d501e46235be1c4891

  • SHA512

    92d81ba99f431109d2ac2bdf7abe236bd9e90a1a7a176ec48b5e24e794420af9e321a2a4427495cb04a729c021dfa9e02e5a80134b2981f9278fdc8bf466c5df

  • SSDEEP

    384:ZXkpYdpjGFMBaxT86thiBhcyDGE0nrKABM48Oa2avENSaUxOoILA3zcFdKtM0jH:ZV4TvJKAO48f2XRLC

Malware Config

Targets

    • Target

      sample

    • Size

      19KB

    • MD5

      69ef79397fa0aa72de8c4371012a3525

    • SHA1

      0c9dddb9b6ddefa16cccf7af1168a524b0057913

    • SHA256

      748415008bed7e4d275e94b2f8c518494f5992ccf6e383d501e46235be1c4891

    • SHA512

      92d81ba99f431109d2ac2bdf7abe236bd9e90a1a7a176ec48b5e24e794420af9e321a2a4427495cb04a729c021dfa9e02e5a80134b2981f9278fdc8bf466c5df

    • SSDEEP

      384:ZXkpYdpjGFMBaxT86thiBhcyDGE0nrKABM48Oa2avENSaUxOoILA3zcFdKtM0jH:ZV4TvJKAO48f2XRLC

    • Modifies firewall policy service

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks