General

  • Target

    ToX_Free_Utility_v1.8.bat

  • Size

    96KB

  • Sample

    240911-ng577ayamd

  • MD5

    77833823ecd3754d0099e019f7e885d0

  • SHA1

    e65494c444f7c42032372a09e1179c6f6950ae24

  • SHA256

    26f07e440dfd3b8b410fdd75ec04595b79c57e8be2a13c14dd746840ff33983c

  • SHA512

    52f951f9f253af8499538d810f53242f32c24c7f6b27d8ef76abf2c8c8b1c8e7d31e0b3a7c52ad70fdd1f41a54fa023b21fde7bea24942fa6bf61afb4dd95547

  • SSDEEP

    768:SXQO3gNjy0y7PHYW9CyptHDXxRSyeVlEeOh/853gzI1vavQw8gsQmVHQQCHQVbOy:GQTgvptHriyd017wIUS

Malware Config

Targets

    • Target

      ToX_Free_Utility_v1.8.bat

    • Size

      96KB

    • MD5

      77833823ecd3754d0099e019f7e885d0

    • SHA1

      e65494c444f7c42032372a09e1179c6f6950ae24

    • SHA256

      26f07e440dfd3b8b410fdd75ec04595b79c57e8be2a13c14dd746840ff33983c

    • SHA512

      52f951f9f253af8499538d810f53242f32c24c7f6b27d8ef76abf2c8c8b1c8e7d31e0b3a7c52ad70fdd1f41a54fa023b21fde7bea24942fa6bf61afb4dd95547

    • SSDEEP

      768:SXQO3gNjy0y7PHYW9CyptHDXxRSyeVlEeOh/853gzI1vavQw8gsQmVHQQCHQVbOy:GQTgvptHriyd017wIUS

    • UAC bypass

    • Modifies boot configuration data using bcdedit

    • Event Triggered Execution: Image File Execution Options Injection

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

MITRE ATT&CK Enterprise v15

Tasks