General

  • Target

    de206bab0f5e87d52ed35acf947aa5b0N.exe

  • Size

    51KB

  • Sample

    240915-j4zxgathrk

  • MD5

    de206bab0f5e87d52ed35acf947aa5b0

  • SHA1

    7a96f073c22d05ede36f5d65d41294201e264c5b

  • SHA256

    a4b2f0d1ec6c95c34855783132ecdef02e5f81b7f8faf02d6bfe880dc79c507b

  • SHA512

    77b3cb49daef8de95098e96c65e9825283ec04d2963188bab83b9725638d9eb9a0fa670b340d4b44ce705074465fb18322c60fbad57e460c5909003e86a07051

  • SSDEEP

    768:nNAGAkIo/juokwoL7627d9rIiClJAxiFkJT22euOiya6lHOYxY0x0KS3j:nNJb/HkwoLe29UjQ4wqQOLIMVnS3j

Malware Config

Targets

    • Target

      de206bab0f5e87d52ed35acf947aa5b0N.exe

    • Size

      51KB

    • MD5

      de206bab0f5e87d52ed35acf947aa5b0

    • SHA1

      7a96f073c22d05ede36f5d65d41294201e264c5b

    • SHA256

      a4b2f0d1ec6c95c34855783132ecdef02e5f81b7f8faf02d6bfe880dc79c507b

    • SHA512

      77b3cb49daef8de95098e96c65e9825283ec04d2963188bab83b9725638d9eb9a0fa670b340d4b44ce705074465fb18322c60fbad57e460c5909003e86a07051

    • SSDEEP

      768:nNAGAkIo/juokwoL7627d9rIiClJAxiFkJT22euOiya6lHOYxY0x0KS3j:nNJb/HkwoLe29UjQ4wqQOLIMVnS3j

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks