Resubmissions

19/08/2024, 14:34

240819-rxlp9sshnn 8

19/08/2024, 14:02

240819-rb5k9axhrg 8

General

  • Target

    MEMZ-Harmless.py

  • Size

    8KB

  • Sample

    240819-rxlp9sshnn

  • MD5

    c4cbb7abe052dea206a9bc1c7b56a987

  • SHA1

    d7ebe99285e12d747e9ee248d87bd6839d60b8f7

  • SHA256

    e7d4e9a8e51a991da469dd73aab74b54e6a72b7d4a6f12fb8f4ab797018d54e7

  • SHA512

    4c9fc59997683a996c4d35fe34c25fd04fabbf060d148fa22de54066e35fcca2d4d03f24b4f50cd0619c59a100ebfe7db842161c672feb1e37e81dc8186086b3

  • SSDEEP

    192:pY2go6KLuko4bkYEz5kcEk/2x5YwYjcfb0/VfqQ:pngxkock3kDk/xj

Malware Config

Targets

    • Target

      MEMZ-Harmless.py

    • Size

      8KB

    • MD5

      c4cbb7abe052dea206a9bc1c7b56a987

    • SHA1

      d7ebe99285e12d747e9ee248d87bd6839d60b8f7

    • SHA256

      e7d4e9a8e51a991da469dd73aab74b54e6a72b7d4a6f12fb8f4ab797018d54e7

    • SHA512

      4c9fc59997683a996c4d35fe34c25fd04fabbf060d148fa22de54066e35fcca2d4d03f24b4f50cd0619c59a100ebfe7db842161c672feb1e37e81dc8186086b3

    • SSDEEP

      192:pY2go6KLuko4bkYEz5kcEk/2x5YwYjcfb0/VfqQ:pngxkock3kDk/xj

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks