Resubmissions

12-08-2024 08:51

240812-kr9ftatejq 8

12-08-2024 08:50

240812-kr2e7sxhpf 1

General

  • Target

    tiktok.py

  • Size

    11KB

  • Sample

    240812-kr9ftatejq

  • MD5

    2c0761bb6784f5575a353df05814723b

  • SHA1

    9e2597a4da985e106a370ae566d8d7fa7e5f287e

  • SHA256

    c1f38834159d6d4f1202c3bff660debe851713b24e0024c71bf937f9dfd90973

  • SHA512

    3fd7976c5b3bc482ccbd9b97397fd8c5321ddea51835e559194dcff9f1b6b66ada6b572ca6e586be5a742d25cf9079ff986c4fc915076d233160c11a004d00fc

  • SSDEEP

    192:eTw1+fS2TR0zugo6a4kjA27tZWSSjSKNZ96cTcUQRmTcTcpQcjojELn:eDBhArExk2uDcRp9cjoje

Malware Config

Targets

    • Target

      tiktok.py

    • Size

      11KB

    • MD5

      2c0761bb6784f5575a353df05814723b

    • SHA1

      9e2597a4da985e106a370ae566d8d7fa7e5f287e

    • SHA256

      c1f38834159d6d4f1202c3bff660debe851713b24e0024c71bf937f9dfd90973

    • SHA512

      3fd7976c5b3bc482ccbd9b97397fd8c5321ddea51835e559194dcff9f1b6b66ada6b572ca6e586be5a742d25cf9079ff986c4fc915076d233160c11a004d00fc

    • SSDEEP

      192:eTw1+fS2TR0zugo6a4kjA27tZWSSjSKNZ96cTcUQRmTcTcpQcjojELn:eDBhArExk2uDcRp9cjoje

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks