Resubmissions

15-09-2024 23:12

240915-27aqvsxhjq 8

15-09-2024 23:02

240915-21efgaxake 8

15-09-2024 22:58

240915-2xypyaxdkj 3

15-09-2024 22:56

240915-2wn44sxcpk 3

15-09-2024 22:43

240915-2np2fawhpr 3

15-09-2024 22:42

240915-2m3k5swhmk 10

15-09-2024 22:33

240915-2gqdmawbja 8

15-09-2024 22:27

240915-2de4gswekk 7

15-09-2024 22:15

240915-16esravenh 10

General

  • Target

    eeeeeeeeeeeeee.zip

  • Size

    82.4MB

  • Sample

    240915-2gqdmawbja

  • MD5

    bf78359f6f126b4216ace9edf63f1b39

  • SHA1

    d59846e938348f7a3c48b6cc304545a6ed87816c

  • SHA256

    734403a96fad68cb2ef2b340adddd9cadd5894007aac703dcdb4a4cb8326c538

  • SHA512

    1fc2cdccf5dd6956896d1d90e0cbdf20e02b2586b59736921de9811dafec9c6ffeeb5082a56b3dd4a13283b7a08163cbea5576bd869f7b841a801b2962ef3dfa

  • SSDEEP

    1572864:WuWJiEjJ5HXL3sPp12Elt9J/oQnQbz0Tipr4mUOzOgwLNL+mTdmOyd:W1Ji+HXL3sPyC9RoFwid4qnwZCmTdm3d

Malware Config

Targets

    • Target

      eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/zip bomb.zip

    • Size

      41KB

    • MD5

      1df9a18b18332f153918030b7b516615

    • SHA1

      6c42c62696616b72bbfc88a4be4ead57aa7bc503

    • SHA256

      bbd05de19aa2af1455c0494639215898a15286d9b05073b6c4817fe24b2c36fa

    • SHA512

      6382ca9c307d66ab7566acf78b1afd44b18b24d766253e1dc1cb3a3c0be96ecf1f2042d6bd3332d49078ffee571cf98869c1284c1d3e5c1c7dc3e4c64f71af80

    • SSDEEP

      768:hzyVr8GSKL6O3QOXk/0u3wqOghrFCezL1VFJdbq2QTJTw02Q:hGx8DKXE//ZhhCirFi2cwK

    • Disables Task Manager via registry modification

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks