General
-
Target
artifacts.zip
-
Size
139.8MB
-
Sample
240822-rv83savbnr
-
MD5
d0e1b50214b55a05c9c36f5d6af0e5e0
-
SHA1
29d6d783b4f55c9293e75d63dc58c92ad757d7b0
-
SHA256
d34d5d293ef589bc20d27d216385f34706a8a049460633a9476222e0a3bd0680
-
SHA512
021c08bbc3e30ff672cc69210295598b84f8d2aa33a7c42e11fc09a1b6b70627aba5281bf2903040d06f2049f1b4cbbc6684d280531a9cf89cc812f65ed4810f
-
SSDEEP
3145728:RyRREc3Z0CqFp83bUchCAXDSlBAvPkKkzc+wVlOljKhvsPnN4yo8EmQ/Wqu9:yJWHG3LhCVleHkYlOljtN4GQ/Wqu9
Behavioral task
behavioral1
Sample
artifacts.zip
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
artifacts.zip
-
Size
139.8MB
-
MD5
d0e1b50214b55a05c9c36f5d6af0e5e0
-
SHA1
29d6d783b4f55c9293e75d63dc58c92ad757d7b0
-
SHA256
d34d5d293ef589bc20d27d216385f34706a8a049460633a9476222e0a3bd0680
-
SHA512
021c08bbc3e30ff672cc69210295598b84f8d2aa33a7c42e11fc09a1b6b70627aba5281bf2903040d06f2049f1b4cbbc6684d280531a9cf89cc812f65ed4810f
-
SSDEEP
3145728:RyRREc3Z0CqFp83bUchCAXDSlBAvPkKkzc+wVlOljKhvsPnN4yo8EmQ/Wqu9:yJWHG3LhCVleHkYlOljtN4GQ/Wqu9
-
Checks for common network interception software
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
3Install Root Certificate
1SIP and Trust Provider Hijacking
2