General

  • Target

    Sa5m0bhJ

  • Size

    2KB

  • Sample

    240822-w6fylatgqm

  • MD5

    8a83ddf3abf36fb90dea196a61c1ed51

  • SHA1

    b087eab802c4f4c3854a341127314241048f81fb

  • SHA256

    856d2fbe65323a42d191298f3b960dd86cc5222cf652186284c6eed0e972a6ff

  • SHA512

    2c0334dee744f5cb5446ee452f809cc0b9a11d9e329c995d38ed93da04fb0b710ea7333ab29b22a015134ac26d9413e440ce72ae53201f7f3f830d12009cffc4

Malware Config

Targets

    • Target

      Sa5m0bhJ

    • Size

      2KB

    • MD5

      8a83ddf3abf36fb90dea196a61c1ed51

    • SHA1

      b087eab802c4f4c3854a341127314241048f81fb

    • SHA256

      856d2fbe65323a42d191298f3b960dd86cc5222cf652186284c6eed0e972a6ff

    • SHA512

      2c0334dee744f5cb5446ee452f809cc0b9a11d9e329c995d38ed93da04fb0b710ea7333ab29b22a015134ac26d9413e440ce72ae53201f7f3f830d12009cffc4

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks