General

  • Target

    2024-07-27_9089db63f522f1030cb2abda708e1d80_goldeneye

  • Size

    197KB

  • Sample

    240727-jwqzlaycra

  • MD5

    9089db63f522f1030cb2abda708e1d80

  • SHA1

    2db9beaf48a405227a26961c97ebf9b6c04e49e9

  • SHA256

    c2061adeb1294cc98488cb84429eef3f61ca1b486e42b416f55dbecbb5777587

  • SHA512

    b0855e6d0e5cac7858b341404ab92299531ee84625894087fabac045ba5ddb5c05020da2ee7eda8fa49cb9838b1d1b8671ba0eed184b91450e212e7673d5b7f1

  • SSDEEP

    3072:jEGh0oWl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGolEeKcAEca

Malware Config

Targets

    • Target

      2024-07-27_9089db63f522f1030cb2abda708e1d80_goldeneye

    • Size

      197KB

    • MD5

      9089db63f522f1030cb2abda708e1d80

    • SHA1

      2db9beaf48a405227a26961c97ebf9b6c04e49e9

    • SHA256

      c2061adeb1294cc98488cb84429eef3f61ca1b486e42b416f55dbecbb5777587

    • SHA512

      b0855e6d0e5cac7858b341404ab92299531ee84625894087fabac045ba5ddb5c05020da2ee7eda8fa49cb9838b1d1b8671ba0eed184b91450e212e7673d5b7f1

    • SSDEEP

      3072:jEGh0oWl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGolEeKcAEca

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Deletes itself

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks