General

  • Target

    ziv_2023.exe

  • Size

    16.3MB

  • Sample

    240824-3qxdzaxhnm

  • MD5

    9d5e30fb8aca2302ed39eb3361744904

  • SHA1

    d96a2ceb8e800a403a5dff59e39e31c39979d887

  • SHA256

    70a22dd03bb42970c17824e50e6c9a26d337d0241242b98f9f61462a1707f878

  • SHA512

    4bb49325fbadddb1779b91d0aafc755195e202d7a4dbdd6ae1a5a17dfdf798ff91828eee2a24450036b508d9d50db80cfc4695c8db6a330342782445a813ade1

  • SSDEEP

    393216:JinXoakgCRwnAWOmB1Iecpai7mKJiTzP7gQug07Mhm/XK:J+YuCRwn1OOxgmKJIXgF72m/K

Malware Config

Targets

    • Target

      ziv_2023.exe

    • Size

      16.3MB

    • MD5

      9d5e30fb8aca2302ed39eb3361744904

    • SHA1

      d96a2ceb8e800a403a5dff59e39e31c39979d887

    • SHA256

      70a22dd03bb42970c17824e50e6c9a26d337d0241242b98f9f61462a1707f878

    • SHA512

      4bb49325fbadddb1779b91d0aafc755195e202d7a4dbdd6ae1a5a17dfdf798ff91828eee2a24450036b508d9d50db80cfc4695c8db6a330342782445a813ade1

    • SSDEEP

      393216:JinXoakgCRwnAWOmB1Iecpai7mKJiTzP7gQug07Mhm/XK:J+YuCRwn1OOxgmKJIXgF72m/K

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks