General

  • Target

    sample

  • Size

    21KB

  • Sample

    240806-j3kq6axhld

  • MD5

    8d9f69fa573fc8a192920ff0cfc7cbfb

  • SHA1

    75d38492d2a223d230507a3c318d8c35df7f7481

  • SHA256

    ed2cf5720f8fce799cedf380b89baf458c8dc5717a27944517d64a34fa9fdb76

  • SHA512

    9ec3dee709b609b5635028fd6a28da0bbc267544d3272df1c3c5fed97f90fa2ddba5d7acf70af4b68dc430071f656447d6f9bdc74b9a7764622cd6cfe55f0793

  • SSDEEP

    384:LLO4vGpKyAXpKyAUpKyA/mRSmmokELFvtqBCpKyAW1pKyAWDpKyAWnc+/R9:LLO4o5s5V5//C855r55l55t/R9

Malware Config

Targets

    • Target

      sample

    • Size

      21KB

    • MD5

      8d9f69fa573fc8a192920ff0cfc7cbfb

    • SHA1

      75d38492d2a223d230507a3c318d8c35df7f7481

    • SHA256

      ed2cf5720f8fce799cedf380b89baf458c8dc5717a27944517d64a34fa9fdb76

    • SHA512

      9ec3dee709b609b5635028fd6a28da0bbc267544d3272df1c3c5fed97f90fa2ddba5d7acf70af4b68dc430071f656447d6f9bdc74b9a7764622cd6cfe55f0793

    • SSDEEP

      384:LLO4vGpKyAXpKyAUpKyA/mRSmmokELFvtqBCpKyAW1pKyAWDpKyAWnc+/R9:LLO4o5s5V5//C855r55l55t/R9

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks