General
-
Target
punkt.py
-
Size
678B
-
Sample
240829-ykff2szenm
-
MD5
d7932611c7c7fd90ededb5d3b8b73d09
-
SHA1
c7059ce0693aeea1f491dd369ee539dd58e60aba
-
SHA256
26d4e9f29b48a8dda6fef47e30269e9564122387348e426c0b8f8b36e77e89c5
-
SHA512
fdf679230d49e228610b7ae24ea14af7597c6cdc9b3ae45c3c87cc476f43f33b99b8abe331d300690f8f370758d67820f8ae1c195c3bf21f9d1e0da006605736
Static task
static1
Behavioral task
behavioral1
Sample
punkt.py
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
punkt.py
-
Size
678B
-
MD5
d7932611c7c7fd90ededb5d3b8b73d09
-
SHA1
c7059ce0693aeea1f491dd369ee539dd58e60aba
-
SHA256
26d4e9f29b48a8dda6fef47e30269e9564122387348e426c0b8f8b36e77e89c5
-
SHA512
fdf679230d49e228610b7ae24ea14af7597c6cdc9b3ae45c3c87cc476f43f33b99b8abe331d300690f8f370758d67820f8ae1c195c3bf21f9d1e0da006605736
Score8/10-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1