Resubmissions

11-08-2024 09:34

240811-lj7spatfmr 3

11-08-2024 09:33

240811-ljm4aatflj 10

11-08-2024 09:30

240811-lgn8katenn 10

General

  • Target

    groxmc.png

  • Size

    2KB

  • Sample

    240811-lgn8katenn

  • MD5

    5023085e12fb0144d7b97ef02a9f3087

  • SHA1

    241799fdb6fad6beacd8940e3126a4be043b47ee

  • SHA256

    bfddb29a0802115a8fb0192c82a7dce62c2665cae567f7874cd11a1b7fa4a344

  • SHA512

    c72ab5bb7b33f49945cb8b248cc114ae84fb6dd58f876c121c1ddb5b64e38ef7b637fbc2df5c74568ab8d385b76d9798195a61d1b494baed33b61231135db5e6

Malware Config

Targets

    • Target

      groxmc.png

    • Size

      2KB

    • MD5

      5023085e12fb0144d7b97ef02a9f3087

    • SHA1

      241799fdb6fad6beacd8940e3126a4be043b47ee

    • SHA256

      bfddb29a0802115a8fb0192c82a7dce62c2665cae567f7874cd11a1b7fa4a344

    • SHA512

      c72ab5bb7b33f49945cb8b248cc114ae84fb6dd58f876c121c1ddb5b64e38ef7b637fbc2df5c74568ab8d385b76d9798195a61d1b494baed33b61231135db5e6

    • Modifies WinLogon for persistence

    • UAC bypass

    • Disables RegEdit via registry modification

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Modifies WinLogon

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks