General
-
Target
kill.txt
-
Size
359B
-
Sample
240827-1t8kastdkb
-
MD5
98545754fe9fd338cd572f181ee12f8c
-
SHA1
2271521ad371e968f69c99b885edfed3b202066d
-
SHA256
d6cffdbabd9097ea78e00aad333491cb9add18e29ffb23a00f6d302bc0a8bd99
-
SHA512
53bed339b6c0d1d5b898e1ac6c39a07747a888375f86f44ce0c19f4848f28257dc3a512073feb74cedaab9baeab72bcb4ea79094f48f1042585bb45650c5e059
Static task
static1
Behavioral task
behavioral1
Sample
kill.txt
Resource
win7-20240705-en
Malware Config
Targets
-
-
Target
kill.txt
-
Size
359B
-
MD5
98545754fe9fd338cd572f181ee12f8c
-
SHA1
2271521ad371e968f69c99b885edfed3b202066d
-
SHA256
d6cffdbabd9097ea78e00aad333491cb9add18e29ffb23a00f6d302bc0a8bd99
-
SHA512
53bed339b6c0d1d5b898e1ac6c39a07747a888375f86f44ce0c19f4848f28257dc3a512073feb74cedaab9baeab72bcb4ea79094f48f1042585bb45650c5e059
Score8/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1