General

  • Target

    519bbea30a1d8c917848f224ef89b9a7bb321de345a6ce527d362625f29cbd7a

  • Size

    5.0MB

  • Sample

    240909-zhanfs1djc

  • MD5

    b4613aa4fef74a7a5faedebca3d77e9c

  • SHA1

    b17ab70851444403bb8a58d601ad8debcb60a790

  • SHA256

    519bbea30a1d8c917848f224ef89b9a7bb321de345a6ce527d362625f29cbd7a

  • SHA512

    168d01138d57710fe27316902aa037e7226c5cc7c210f5bcfc1882b029dadfcfdacd039dace7595c870d6adb267f4099e0d1074b8f25dca4189107cbeaa84442

  • SSDEEP

    98304:5E8ldVZpn+8vcAAdjj0X9sDuw3F5uNRYZ5oHznKML2ef9ND:LlDrc3X0X9sD1CYTHML2ef

Malware Config

Targets

    • Target

      519bbea30a1d8c917848f224ef89b9a7bb321de345a6ce527d362625f29cbd7a

    • Size

      5.0MB

    • MD5

      b4613aa4fef74a7a5faedebca3d77e9c

    • SHA1

      b17ab70851444403bb8a58d601ad8debcb60a790

    • SHA256

      519bbea30a1d8c917848f224ef89b9a7bb321de345a6ce527d362625f29cbd7a

    • SHA512

      168d01138d57710fe27316902aa037e7226c5cc7c210f5bcfc1882b029dadfcfdacd039dace7595c870d6adb267f4099e0d1074b8f25dca4189107cbeaa84442

    • SSDEEP

      98304:5E8ldVZpn+8vcAAdjj0X9sDuw3F5uNRYZ5oHznKML2ef9ND:LlDrc3X0X9sD1CYTHML2ef

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks