General
-
Target
client.jar
-
Size
710KB
-
Sample
240806-11b5nssbrq
-
MD5
2ed3156d6e771707db539cfa3cc4baab
-
SHA1
21cb3c3af007fe1fa25fc40738cb101a5354ec6d
-
SHA256
1a0fdde9a604444f00f04c6b55ad8f970c264ec8647cf561f601e3a5ad8620c5
-
SHA512
1e841313f018d1f4404d427554e77640cc436bd0086187b63ac02fb6ac1d4f5a165a1f8bb81e73976a488f3627f26e31fb2d91fe4d137356dd55d45d82ec0ee4
-
SSDEEP
12288:PEuk5Cz1Wn6C/bt6qsoR+p5YUdl1Y6FpAoB2/UMzWL8HyfdrCDHk7wqX:Pea1YtOe+9l1JFpAiwUB1lWL2wqX
Static task
static1
Behavioral task
behavioral1
Sample
client.jar
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
client.jar
-
Size
710KB
-
MD5
2ed3156d6e771707db539cfa3cc4baab
-
SHA1
21cb3c3af007fe1fa25fc40738cb101a5354ec6d
-
SHA256
1a0fdde9a604444f00f04c6b55ad8f970c264ec8647cf561f601e3a5ad8620c5
-
SHA512
1e841313f018d1f4404d427554e77640cc436bd0086187b63ac02fb6ac1d4f5a165a1f8bb81e73976a488f3627f26e31fb2d91fe4d137356dd55d45d82ec0ee4
-
SSDEEP
12288:PEuk5Cz1Wn6C/bt6qsoR+p5YUdl1Y6FpAoB2/UMzWL8HyfdrCDHk7wqX:Pea1YtOe+9l1JFpAiwUB1lWL2wqX
Score8/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
3