General
-
Target
ec63af30d0ee34b1cbe9c92ca208d0d185ca6d9f3690d0fc20bd3747c0db48f9N
-
Size
94KB
-
Sample
240919-htyqzswglj
-
MD5
15dfb86a772b6fcaf01b71c67335a2a0
-
SHA1
76182bd65644bc7bea39d6da9dd45ca5f69f0e63
-
SHA256
ec63af30d0ee34b1cbe9c92ca208d0d185ca6d9f3690d0fc20bd3747c0db48f9
-
SHA512
21a75adc84b7f9138141022c85b1880553c1cbbc725187aa9dfb77ad58af3b05a390d6ec4160042e0d6bb003965226c83a71eef64185d6606119d49a7857eef8
-
SSDEEP
1536:o1qcQC5RtxcAra9RD4EFWR7sUMr4zqripZVVm0HpR:i35Rt6ka9REEFMgr4znu0JR
Static task
static1
Behavioral task
behavioral1
Sample
ec63af30d0ee34b1cbe9c92ca208d0d185ca6d9f3690d0fc20bd3747c0db48f9N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ec63af30d0ee34b1cbe9c92ca208d0d185ca6d9f3690d0fc20bd3747c0db48f9N.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
ec63af30d0ee34b1cbe9c92ca208d0d185ca6d9f3690d0fc20bd3747c0db48f9N
-
Size
94KB
-
MD5
15dfb86a772b6fcaf01b71c67335a2a0
-
SHA1
76182bd65644bc7bea39d6da9dd45ca5f69f0e63
-
SHA256
ec63af30d0ee34b1cbe9c92ca208d0d185ca6d9f3690d0fc20bd3747c0db48f9
-
SHA512
21a75adc84b7f9138141022c85b1880553c1cbbc725187aa9dfb77ad58af3b05a390d6ec4160042e0d6bb003965226c83a71eef64185d6606119d49a7857eef8
-
SSDEEP
1536:o1qcQC5RtxcAra9RD4EFWR7sUMr4zqripZVVm0HpR:i35Rt6ka9REEFMgr4znu0JR
Score10/10-
Modifies firewall policy service
-
Adds policy Run key to start application
-
Sets service image path in registry
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
4