General

  • Target

    ac34e44a897a626c34db1c18efcf707fc1d5473a46117586649f31f53c28496a.msi

  • Size

    7.3MB

  • Sample

    240823-cyj6ha1ble

  • MD5

    6086601a8560a2037f5091d8632d0509

  • SHA1

    2a7203ea36b649e95f42a2cf0fcf38347d0a7640

  • SHA256

    ac34e44a897a626c34db1c18efcf707fc1d5473a46117586649f31f53c28496a

  • SHA512

    554fb256c1be49942c3c1b2cf1620c8d364a9fa52de7471808ba282019f87703980c9213045123fa5406916bc2e6e60fe963950d4916c622b1edd1f14032864a

  • SSDEEP

    98304:HAMvSQwxDnl2dYds9GLIeDT3OF6zfAMvSQwxDnl2dYdsTAMvSQwxDnl2dYdsbAMF:bnEPDT3wAn/nHn

Malware Config

Targets

    • Target

      ac34e44a897a626c34db1c18efcf707fc1d5473a46117586649f31f53c28496a.msi

    • Size

      7.3MB

    • MD5

      6086601a8560a2037f5091d8632d0509

    • SHA1

      2a7203ea36b649e95f42a2cf0fcf38347d0a7640

    • SHA256

      ac34e44a897a626c34db1c18efcf707fc1d5473a46117586649f31f53c28496a

    • SHA512

      554fb256c1be49942c3c1b2cf1620c8d364a9fa52de7471808ba282019f87703980c9213045123fa5406916bc2e6e60fe963950d4916c622b1edd1f14032864a

    • SSDEEP

      98304:HAMvSQwxDnl2dYds9GLIeDT3OF6zfAMvSQwxDnl2dYdsTAMvSQwxDnl2dYdsbAMF:bnEPDT3wAn/nHn

    • Sets service image path in registry

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks