General

  • Target

    sheet rat v2.6.zip

  • Size

    47.8MB

  • Sample

    240724-sp2xyswbkc

  • MD5

    ec300ebaaa7468c01f21fded0b6b9fb8

  • SHA1

    0e891101b1bd2502eea6dafc38d6ed1f1e827317

  • SHA256

    e59f363c9dab055eab0e48703cfca9bee4d4ac9ac0c42c3e860a1aa6cf516113

  • SHA512

    93905a2c317229c91e7be5c2606f264e92a62f5fa1598d0e516e2aaef01b4f859639e551b8b20f86f2369c151c7648c04f53974acc422c98a1578a0883ee21ca

  • SSDEEP

    786432:2mwvXDBYQw8Ij9wdmLoJrk8Qr9rPf64zqJZdnkcgBz1XWgYzR3fEUoOw9JBY4QQu:2VXDBYlNhwYLYrPQrPS4SZucgegYzdEM

Malware Config

Targets

    • Target

      sheet rat v2.6.zip

    • Size

      47.8MB

    • MD5

      ec300ebaaa7468c01f21fded0b6b9fb8

    • SHA1

      0e891101b1bd2502eea6dafc38d6ed1f1e827317

    • SHA256

      e59f363c9dab055eab0e48703cfca9bee4d4ac9ac0c42c3e860a1aa6cf516113

    • SHA512

      93905a2c317229c91e7be5c2606f264e92a62f5fa1598d0e516e2aaef01b4f859639e551b8b20f86f2369c151c7648c04f53974acc422c98a1578a0883ee21ca

    • SSDEEP

      786432:2mwvXDBYQw8Ij9wdmLoJrk8Qr9rPf64zqJZdnkcgBz1XWgYzR3fEUoOw9JBY4QQu:2VXDBYlNhwYLYrPQrPS4SZucgegYzdEM

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks