General

  • Target

    e4ed528c73db4126dc3ac3fc8421c30aa3cb7d8b36bb6cedb352f35f4d16ba94

  • Size

    71KB

  • Sample

    240723-ehzblaweke

  • MD5

    755ad0e314d549f5b4a7087a65f8a30c

  • SHA1

    900c295608f60e24d6601aa0391e80970c193b52

  • SHA256

    e4ed528c73db4126dc3ac3fc8421c30aa3cb7d8b36bb6cedb352f35f4d16ba94

  • SHA512

    b344fd6708ed270e194c47f8137c349e83a0695cb990070644e88fcd34b59ba05a73e2fadb1a09a0749aa29003b704455935a4fac7489dc4b5045a189d43aa2b

  • SSDEEP

    768:x/neHUjXYmP4hoZJPYzWmOeBFiO2zs03x48cttDZvxMWxRU0TsMkNVMbmo+to1kj:xWHoXfP4+jCvOeCpWtON0TeAkj

Malware Config

Targets

    • Target

      e4ed528c73db4126dc3ac3fc8421c30aa3cb7d8b36bb6cedb352f35f4d16ba94

    • Size

      71KB

    • MD5

      755ad0e314d549f5b4a7087a65f8a30c

    • SHA1

      900c295608f60e24d6601aa0391e80970c193b52

    • SHA256

      e4ed528c73db4126dc3ac3fc8421c30aa3cb7d8b36bb6cedb352f35f4d16ba94

    • SHA512

      b344fd6708ed270e194c47f8137c349e83a0695cb990070644e88fcd34b59ba05a73e2fadb1a09a0749aa29003b704455935a4fac7489dc4b5045a189d43aa2b

    • SSDEEP

      768:x/neHUjXYmP4hoZJPYzWmOeBFiO2zs03x48cttDZvxMWxRU0TsMkNVMbmo+to1kj:xWHoXfP4+jCvOeCpWtON0TeAkj

    • Windows security bypass

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Event Triggered Execution: Image File Execution Options Injection

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Modifies WinLogon

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks