Resubmissions

14/09/2024, 14:52

240914-r8582szapq 1

14/09/2024, 14:48

240914-r6ggxazdmb 10

General

  • Target

    boom_boom.png

  • Size

    22KB

  • Sample

    240914-r6ggxazdmb

  • MD5

    d255655654c026f8898ff7a73446271c

  • SHA1

    6ae4e95749747c70854610aececf511a248e8965

  • SHA256

    b6507b7430b7137cb9ad53aeeb81ee1080bae0da9073eca4ca20217d7042e656

  • SHA512

    f49a6adcbfebae9e836c5bb5ede55a71c8b26cc03897729d44059b7981e88e320fd8cba988de46f5342a5170c0fffc1cbec52a5dc9462f78a0ac19f1ed24a92c

  • SSDEEP

    384:O68lFFsEyrOpt+KQbqSHw8hg9pACTnxRktnNeeYdFUuQVkua/iP+WZ+i0BdTeM:OP3FsE9XUeSHw8hKpAC/gTV/+W3oTL

Malware Config

Targets

    • Target

      boom_boom.png

    • Size

      22KB

    • MD5

      d255655654c026f8898ff7a73446271c

    • SHA1

      6ae4e95749747c70854610aececf511a248e8965

    • SHA256

      b6507b7430b7137cb9ad53aeeb81ee1080bae0da9073eca4ca20217d7042e656

    • SHA512

      f49a6adcbfebae9e836c5bb5ede55a71c8b26cc03897729d44059b7981e88e320fd8cba988de46f5342a5170c0fffc1cbec52a5dc9462f78a0ac19f1ed24a92c

    • SSDEEP

      384:O68lFFsEyrOpt+KQbqSHw8hg9pACTnxRktnNeeYdFUuQVkua/iP+WZ+i0BdTeM:OP3FsE9XUeSHw8hKpAC/gTV/+W3oTL

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Probable phishing domain

MITRE ATT&CK Enterprise v15

Tasks