General

  • Target

    2024-08-01_78a218091d0b04ab3ea7dd6d18cd1823_hijackloader_poet-rat_snatch

  • Size

    52.5MB

  • Sample

    240915-gwvaxayhlg

  • MD5

    78a218091d0b04ab3ea7dd6d18cd1823

  • SHA1

    fb0395085fc5ac9f2d25367b4e22634236b566b7

  • SHA256

    1b58c8a39519dc0b14e37f8d7c3dcae7917a2f8c991c688b8d02d7633a2b961b

  • SHA512

    b807c5a2d9183e801ca1acb533b2f7656a4eb93f43edf7612e09d665c526b8d5cef7f62d133b7244dd6e7bc4da765425b43feaed2023c06ee13a798835672f75

  • SSDEEP

    393216:xQWI7dGUObPlgbSbrVaheR6X9CDwrps7p8z:xQWQdGUwPlDbBVYaSz

Malware Config

Targets

    • Target

      2024-08-01_78a218091d0b04ab3ea7dd6d18cd1823_hijackloader_poet-rat_snatch

    • Size

      52.5MB

    • MD5

      78a218091d0b04ab3ea7dd6d18cd1823

    • SHA1

      fb0395085fc5ac9f2d25367b4e22634236b566b7

    • SHA256

      1b58c8a39519dc0b14e37f8d7c3dcae7917a2f8c991c688b8d02d7633a2b961b

    • SHA512

      b807c5a2d9183e801ca1acb533b2f7656a4eb93f43edf7612e09d665c526b8d5cef7f62d133b7244dd6e7bc4da765425b43feaed2023c06ee13a798835672f75

    • SSDEEP

      393216:xQWI7dGUObPlgbSbrVaheR6X9CDwrps7p8z:xQWQdGUwPlDbBVYaSz

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks