Resubmissions
03/08/2024, 08:27
240803-kcfvysxfjl 303/08/2024, 08:26
240803-kb15hasdmh 302/08/2024, 23:17
240802-292x5avcjr 602/08/2024, 23:16
240802-29ahwaygrc 602/08/2024, 23:13
240802-27q3vaygma 602/08/2024, 23:10
240802-256qhsvbjm 802/08/2024, 23:08
240802-24j55avanm 802/08/2024, 23:05
240802-2282gayerh 702/08/2024, 23:03
240802-21vgpayepe 1002/08/2024, 22:59
240802-2yey8aydqc 6General
-
Target
https://github.com/Endermanch/MalwareDatabase
-
Sample
240802-2282gayerh
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Endermanch/MalwareDatabase
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
https://github.com/Endermanch/MalwareDatabase
Score7/10-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Modifies system executable filetype association
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Privilege Escalation
Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1