General

  • Target

    sample

  • Size

    19KB

  • Sample

    240818-f331ysxgqc

  • MD5

    c99552f2ae113f5aaf914c2eb142dfef

  • SHA1

    19dd47b6537f9be05a66e4664f47ba7a734fa6de

  • SHA256

    3b7ae2b9f01864c0e6ff0d2114384870ff57374b9cbc3443028d5b22a3381608

  • SHA512

    a395161ef5b988ff6ce198477fb3e0953a2a9f06a5fcde1d3a893aa2f2210a139c8bddb60383cae664482b74154feffb1c1352a0134c98714a6e385391193b35

  • SSDEEP

    384:4sho1vrqCspa1ocy4Msb4lbGaBs2MvhpNLs4HKsr0scBsDstsU1S2m0Y3Y06Ib3b:4KaTq01ocy4MBEaBAJpNL3Ko0x2kt3Y3

Malware Config

Targets

    • Target

      sample

    • Size

      19KB

    • MD5

      c99552f2ae113f5aaf914c2eb142dfef

    • SHA1

      19dd47b6537f9be05a66e4664f47ba7a734fa6de

    • SHA256

      3b7ae2b9f01864c0e6ff0d2114384870ff57374b9cbc3443028d5b22a3381608

    • SHA512

      a395161ef5b988ff6ce198477fb3e0953a2a9f06a5fcde1d3a893aa2f2210a139c8bddb60383cae664482b74154feffb1c1352a0134c98714a6e385391193b35

    • SSDEEP

      384:4sho1vrqCspa1ocy4Msb4lbGaBs2MvhpNLs4HKsr0scBsDstsU1S2m0Y3Y06Ib3b:4KaTq01ocy4MBEaBAJpNL3Ko0x2kt3Y3

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks