General

  • Target

    future async.txt

  • Size

    6KB

  • Sample

    240802-lkq7bsthqq

  • MD5

    d804615ca8558fca95fed8378562619a

  • SHA1

    8a41366d3233fff32cd39feb8a719145c716e930

  • SHA256

    9da0d6964391c9da7afe9b054c1c25a854d4f1cf9166e28dc24f4bf5555862ea

  • SHA512

    eebfded746b760e1764cb04eeeba16bf1cd4ef3a2369672069e2c1ce63d97715c78087dd82a6c6d796bb8dccd6ab7055197261f68792a68e82f09f1b43ffd6af

  • SSDEEP

    192:bwbEe18tmXp1asur2ZmDexows0CwpwjwC:MbEe16mXp1asurDeb1akC

Malware Config

Targets

    • Target

      future async.txt

    • Size

      6KB

    • MD5

      d804615ca8558fca95fed8378562619a

    • SHA1

      8a41366d3233fff32cd39feb8a719145c716e930

    • SHA256

      9da0d6964391c9da7afe9b054c1c25a854d4f1cf9166e28dc24f4bf5555862ea

    • SHA512

      eebfded746b760e1764cb04eeeba16bf1cd4ef3a2369672069e2c1ce63d97715c78087dd82a6c6d796bb8dccd6ab7055197261f68792a68e82f09f1b43ffd6af

    • SSDEEP

      192:bwbEe18tmXp1asur2ZmDexows0CwpwjwC:MbEe16mXp1asurDeb1akC

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks