General

  • Target

    TLauncher.exe

  • Size

    5.2MB

  • Sample

    240823-2zckgstgpj

  • MD5

    1f73fb40bb5f2adfba15a2ff635e38f1

  • SHA1

    a1d86b12e6776224a27cd86e50f9fddfed080da4

  • SHA256

    9904f3d58a967aca7b4a74b182d930b380eb72d19f61cfefff86f65702c35385

  • SHA512

    1e48fd4a01cbc005b99a8c2a21807f892e224ab0b9e16298683ecb7a64f30a7a9583853c2a9e7a0bdc0fa010e0d9a816d182126a379e64c4f016646ca89c813b

  • SSDEEP

    98304:Cw8pCe+8AS5JWqKZt3RDYAR4126J7BnII1FkYUE2f2oTMcLb:v8p+I5JWbbhsU4126J9II1FkpEy24t

Malware Config

Targets

    • Target

      TLauncher.exe

    • Size

      5.2MB

    • MD5

      1f73fb40bb5f2adfba15a2ff635e38f1

    • SHA1

      a1d86b12e6776224a27cd86e50f9fddfed080da4

    • SHA256

      9904f3d58a967aca7b4a74b182d930b380eb72d19f61cfefff86f65702c35385

    • SHA512

      1e48fd4a01cbc005b99a8c2a21807f892e224ab0b9e16298683ecb7a64f30a7a9583853c2a9e7a0bdc0fa010e0d9a816d182126a379e64c4f016646ca89c813b

    • SSDEEP

      98304:Cw8pCe+8AS5JWqKZt3RDYAR4126J7BnII1FkYUE2f2oTMcLb:v8p+I5JWbbhsU4126J9II1FkpEy24t

    • Drops desktop.ini file(s)

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks