General

  • Target

    backup.json

  • Size

    48KB

  • Sample

    240821-fyl7msvfnr

  • MD5

    de877cd7ad7263a44cd288c4335b9e1a

  • SHA1

    eebcdc40838de50e874590d34536e04653da97f9

  • SHA256

    90386861f1a1c45c940c973a720730720223ba68416e328deb35204bff5a2094

  • SHA512

    bac716b6436c8b594832f976e3ff20df4fb13356e0e9f459f60a3a05e06d730d7d93e718121fdcbc31f9b25223975a1ddf49198e4b8d5142b6732f03d77980d7

  • SSDEEP

    768:rPpi8B6r+PGFr3BI2ODO5/pY1SKT3GeAMx6fiuv/ALWmBbf4qE/oS6Rnr6lQi3Hh:EUEZHKqJmJK

Malware Config

Targets

    • Target

      backup.json

    • Size

      48KB

    • MD5

      de877cd7ad7263a44cd288c4335b9e1a

    • SHA1

      eebcdc40838de50e874590d34536e04653da97f9

    • SHA256

      90386861f1a1c45c940c973a720730720223ba68416e328deb35204bff5a2094

    • SHA512

      bac716b6436c8b594832f976e3ff20df4fb13356e0e9f459f60a3a05e06d730d7d93e718121fdcbc31f9b25223975a1ddf49198e4b8d5142b6732f03d77980d7

    • SSDEEP

      768:rPpi8B6r+PGFr3BI2ODO5/pY1SKT3GeAMx6fiuv/ALWmBbf4qE/oS6Rnr6lQi3Hh:EUEZHKqJmJK

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks