General

  • Target

    AutoClicker.exe

  • Size

    22.9MB

  • Sample

    240720-csveaascjp

  • MD5

    5a698a33fd6047a9a3e1de1573957cbe

  • SHA1

    03d94392c6b3045d56d928b1485cd2c4bd37716c

  • SHA256

    58e95498d50fe20c7dd3240c033e0334aac094d6d99a076e1935ddd5238ff1c9

  • SHA512

    4a7b4eba0c6d942d3d6847581517db41d1b987a923e72c53384a9a4ce944adda03bd5342449707cac7cfba97d65fa1f16c7970c2985fc5f66de5d48485d36065

  • SSDEEP

    393216:rb+ZghJgRTdkGHuMkMoCWoyIbdE6ghnVxlYjNn1zHDfDoc6v+bkG:f+ZghJsTdXHuMknwyIu6ghnVxSjvHb7q

Malware Config

Targets

    • Target

      AutoClicker.exe

    • Size

      22.9MB

    • MD5

      5a698a33fd6047a9a3e1de1573957cbe

    • SHA1

      03d94392c6b3045d56d928b1485cd2c4bd37716c

    • SHA256

      58e95498d50fe20c7dd3240c033e0334aac094d6d99a076e1935ddd5238ff1c9

    • SHA512

      4a7b4eba0c6d942d3d6847581517db41d1b987a923e72c53384a9a4ce944adda03bd5342449707cac7cfba97d65fa1f16c7970c2985fc5f66de5d48485d36065

    • SSDEEP

      393216:rb+ZghJgRTdkGHuMkMoCWoyIbdE6ghnVxlYjNn1zHDfDoc6v+bkG:f+ZghJsTdXHuMknwyIu6ghnVxSjvHb7q

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks