General

  • Target

    Server.exe

  • Size

    1.8MB

  • Sample

    240804-qkmalawdjm

  • MD5

    8eabcefd2de8de4165d584a9e5e97442

  • SHA1

    938a8218cba785ac55e521218d0a09dfe8a4d0e9

  • SHA256

    fd2511e8d9494103d9b11298bee748449392fc742e2952152142840701080427

  • SHA512

    c6607bae21c061ad38292bd7b2810d3cab6d4f1487383b52caf5fcaa5d41e177586ec22cbaff2fef857e44ba827294a5a7e0062556065058b43f966de7dc91e7

  • SSDEEP

    49152:l9ItXMQYmomSkmmtEQQQUmemmmmmmIzmeywwq07uDrWd:l9ItUmomSkmmtEQQQUmemmmmmmIzmeyJ

Malware Config

Targets

    • Target

      Server.exe

    • Size

      1.8MB

    • MD5

      8eabcefd2de8de4165d584a9e5e97442

    • SHA1

      938a8218cba785ac55e521218d0a09dfe8a4d0e9

    • SHA256

      fd2511e8d9494103d9b11298bee748449392fc742e2952152142840701080427

    • SHA512

      c6607bae21c061ad38292bd7b2810d3cab6d4f1487383b52caf5fcaa5d41e177586ec22cbaff2fef857e44ba827294a5a7e0062556065058b43f966de7dc91e7

    • SSDEEP

      49152:l9ItXMQYmomSkmmtEQQQUmemmmmmmIzmeywwq07uDrWd:l9ItUmomSkmmtEQQQUmemmmmmmIzmeyJ

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks