Resubmissions

17-08-2024 03:20

240817-dv6qrsxfnq 10

17-08-2024 03:17

240817-ds91eavajf 10

General

  • Target

    discrord war (1).zip

  • Size

    18.3MB

  • Sample

    240817-dv6qrsxfnq

  • MD5

    d8e673be49c81168d5b1ebedca1e0d5d

  • SHA1

    668305dccd7bf53539523f6fdf454aaa979369ac

  • SHA256

    ae9593eef2c3b0d3656807f06c8c7ed4d4171384fbc3a1cc4c846d79c75dd31c

  • SHA512

    ee23c606c2f003204eb1dce7295cfa990c607bb2d10f2f6d13f0b0f901e97bb36353619c9f6a8336bb353d1c6f750d564c9231c063517c8536fddbd8ae9188a5

  • SSDEEP

    393216:imS5plwo4ddG+3uM/7tUUF2aDsfH+E94jAxqpb+aez0MfCt:imS5plwo4ddJHR92awfHYpqz0t

Malware Config

Targets

    • Target

      discrord war (1).zip

    • Size

      18.3MB

    • MD5

      d8e673be49c81168d5b1ebedca1e0d5d

    • SHA1

      668305dccd7bf53539523f6fdf454aaa979369ac

    • SHA256

      ae9593eef2c3b0d3656807f06c8c7ed4d4171384fbc3a1cc4c846d79c75dd31c

    • SHA512

      ee23c606c2f003204eb1dce7295cfa990c607bb2d10f2f6d13f0b0f901e97bb36353619c9f6a8336bb353d1c6f750d564c9231c063517c8536fddbd8ae9188a5

    • SSDEEP

      393216:imS5plwo4ddG+3uM/7tUUF2aDsfH+E94jAxqpb+aez0MfCt:imS5plwo4ddJHR92awfHYpqz0t

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks