General

  • Target

    67a7a21becac8f11dece85c3bf41a420N.exe

  • Size

    68KB

  • Sample

    240722-f254xs1bpq

  • MD5

    67a7a21becac8f11dece85c3bf41a420

  • SHA1

    75e644a165a8f2fab0616e3f1525120c5e191b8e

  • SHA256

    a6f9591bece615711886382cb662813c141e66c61203967fa549391037f5d9d9

  • SHA512

    57ce57bb6e4916f737303a7675449e277485045651e38e308b4cdd02f868cff5925b8471d2a81c018a6cf1ed9891f652d53ae4c52acc81d683dad9a475a64165

  • SSDEEP

    1536:1teqKDlXvCDB04f5Gn/L8FlADNt3d1Hw87s:Olg35GTslA5t3/w8o

Malware Config

Targets

    • Target

      67a7a21becac8f11dece85c3bf41a420N.exe

    • Size

      68KB

    • MD5

      67a7a21becac8f11dece85c3bf41a420

    • SHA1

      75e644a165a8f2fab0616e3f1525120c5e191b8e

    • SHA256

      a6f9591bece615711886382cb662813c141e66c61203967fa549391037f5d9d9

    • SHA512

      57ce57bb6e4916f737303a7675449e277485045651e38e308b4cdd02f868cff5925b8471d2a81c018a6cf1ed9891f652d53ae4c52acc81d683dad9a475a64165

    • SSDEEP

      1536:1teqKDlXvCDB04f5Gn/L8FlADNt3d1Hw87s:Olg35GTslA5t3/w8o

    • Windows security bypass

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Event Triggered Execution: Image File Execution Options Injection

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Modifies WinLogon

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks