General

  • Target

    Celery.exe

  • Size

    17.3MB

  • Sample

    240803-jbvr2s1eph

  • MD5

    71a68a133fc26a4130c39a5afa454011

  • SHA1

    94df73ddeecfbf3a51031aa53e00e93826635a75

  • SHA256

    26d92eaa579e0117db22d9b1130c7e1923c45c34baa0c73d235b4c9611388c56

  • SHA512

    f7f8895d17fa3d56b935f785433732bef49d3e08cb4398624ec1c91cf02b6ca01dfde9ee668671753c4cb94e897d37c0e966c5d9119fe83dcc7e317d5e73d63b

  • SSDEEP

    393216:6Ua57DdNAuyvw4wK/gsrlVwgqI59D8exrbwANXg5yH4LVvI4:G1d2toVKrR5qI59woPXlOLm4

Malware Config

Targets

    • Target

      Celery.exe

    • Size

      17.3MB

    • MD5

      71a68a133fc26a4130c39a5afa454011

    • SHA1

      94df73ddeecfbf3a51031aa53e00e93826635a75

    • SHA256

      26d92eaa579e0117db22d9b1130c7e1923c45c34baa0c73d235b4c9611388c56

    • SHA512

      f7f8895d17fa3d56b935f785433732bef49d3e08cb4398624ec1c91cf02b6ca01dfde9ee668671753c4cb94e897d37c0e966c5d9119fe83dcc7e317d5e73d63b

    • SSDEEP

      393216:6Ua57DdNAuyvw4wK/gsrlVwgqI59D8exrbwANXg5yH4LVvI4:G1d2toVKrR5qI59woPXlOLm4

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks