General
-
Target
test4.py
-
Size
6KB
-
Sample
240806-b23xcavgpm
-
MD5
dfb0e3f35735c67c64412aac829c07ca
-
SHA1
1b0f000739cc49a6341b3763d91b4502478d15a2
-
SHA256
ac47f02b46662b44d165011849885bf381b2d2525dd14f663871c87fa351fa86
-
SHA512
2dbeb97b28a5d2fc24d8e1663124419c8c8e0fe49039b08c5201a6d9282db7f4126bb0b5f15c2180d1290626c1dd3ddcb443c4f221254a9660894e2d0c26358d
-
SSDEEP
96:f7uxc/e/D/YQ0mgsYNry2eTX3EtcXt10E2nNnrL2:Si/e/D/8ZLV+X3D92nNnrL2
Static task
static1
Behavioral task
behavioral1
Sample
test4.py
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
test4.py
-
Size
6KB
-
MD5
dfb0e3f35735c67c64412aac829c07ca
-
SHA1
1b0f000739cc49a6341b3763d91b4502478d15a2
-
SHA256
ac47f02b46662b44d165011849885bf381b2d2525dd14f663871c87fa351fa86
-
SHA512
2dbeb97b28a5d2fc24d8e1663124419c8c8e0fe49039b08c5201a6d9282db7f4126bb0b5f15c2180d1290626c1dd3ddcb443c4f221254a9660894e2d0c26358d
-
SSDEEP
96:f7uxc/e/D/YQ0mgsYNry2eTX3EtcXt10E2nNnrL2:Si/e/D/8ZLV+X3D92nNnrL2
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Downloads MZ/PE file
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Deletes itself
-
Drops startup file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1