General

  • Target

    4d1992eca3e947ab0b8cdbc14f70e7c0N.exe

  • Size

    256KB

  • Sample

    240817-cz861ssdme

  • MD5

    4d1992eca3e947ab0b8cdbc14f70e7c0

  • SHA1

    7a17971f57bc99145c625afd719086e7834b6d11

  • SHA256

    dc79dde7079a179e8c9b21ec9cb7c0fd98a09fcd96967abc930de5ff5f76a7ec

  • SHA512

    93ffef0fafe1a0b183c636c37515d43d3d0cb6ba4a3e8e5f4c70a3744579578d5eb79d48db7f57a26beb7af34436f96864f41a41a7a4fbb2c10130047e670686

  • SSDEEP

    6144:YDLQxoyQ1LpnFyZ+dayL9rvolH8u3ZhGod:AQCyQ1LHk+zR7QHjGo

Malware Config

Targets

    • Target

      4d1992eca3e947ab0b8cdbc14f70e7c0N.exe

    • Size

      256KB

    • MD5

      4d1992eca3e947ab0b8cdbc14f70e7c0

    • SHA1

      7a17971f57bc99145c625afd719086e7834b6d11

    • SHA256

      dc79dde7079a179e8c9b21ec9cb7c0fd98a09fcd96967abc930de5ff5f76a7ec

    • SHA512

      93ffef0fafe1a0b183c636c37515d43d3d0cb6ba4a3e8e5f4c70a3744579578d5eb79d48db7f57a26beb7af34436f96864f41a41a7a4fbb2c10130047e670686

    • SSDEEP

      6144:YDLQxoyQ1LpnFyZ+dayL9rvolH8u3ZhGod:AQCyQ1LHk+zR7QHjGo

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops file in Drivers directory

    • Deletes itself

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks