General

  • Target

    EliminarBloatware.zip

  • Size

    1.2MB

  • Sample

    240810-bkbfrsydpm

  • MD5

    62b0b7043f9b8ac3861f288e5f76e4d8

  • SHA1

    01e6d76699f9a6d029c3f17558e7cb242000d01a

  • SHA256

    b30f7052795dc9b809d4542df6fb796040108fcd8b9fde6123b65c9e4e44c7de

  • SHA512

    ec7b8054f81cfe17f8d198782921ae01537b668903a8fd2154ecafdd1103ee314b350b5fa1f53f4d5beeeaa424964d54dc9f60cdc675cbdb3239aa9b853a33e4

  • SSDEEP

    24576:GrQi9Z1/zK6d3I1KmrJBpwbhBnLJyFc0B2pAgxqxWpyfD1aAVMmQr:GrQi5zK2ILrJ/cXnwneBQxWw8Aems

Malware Config

Targets

    • Target

      OOAPB.exe

    • Size

      2.2MB

    • MD5

      16c542b143a0136b5d404bf5179ea923

    • SHA1

      039bc0eaacae791c0b5b7b0d93883958f1c29e92

    • SHA256

      053ce0a4f1cddd3bc6eff802cd1e39a2c55a33798e7ed46df902729bb04941c1

    • SHA512

      797bcb41ac7ff0d2a8c029d7763e7b7f1e03eb392fc8a8be3ef5f90664319cfb68371ce37f36e6fc7988f6bdcf77e318c41b0e01dcf460ecc14711e962dc5538

    • SSDEEP

      24576:PveOYBhfqlUFb7Bipyq4FKowBhwpnk1PyFoBkkAETexypeKcKyOCVinp:XeNNxViVd3rukAanTSxwe3hMp

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • Adds Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Event Triggered Execution: Image File Execution Options Injection

    • Indicator Removal: Clear Persistence

      remove IFEO.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks