General

  • Target

    https://11-samfw.cloud/v2/IxJCDiMnLiw1NkFBAwAsHy8kLhovOx4lFzssIDs2ByAzMUEgOzEUJTMQMCMBOyw/DxYzOjgAFDE4MC8DNQc8QBcbQTU8Ly4xLjYpDDwvIh0JFz4nPDsaPzU7LycyAy8KNBc+Py4IM0EzNi4JNAshJTwlCD8PB0IfATswHjw7ISk0Cy4CHgMeICYbOQAeCwgwHgs2JB4kDT8BFjQfLhEwGiEWBzA1AB0kITgeJS4nIRAyGyAKLhE+DDIABj8hOB4KHiUiMC4XIys8OCA5ND8UJTIAPiUyJy8wNAAvPzwAPisuJy8rLgQUCzIAMEImFiA1LgcgCjs2FDE7Bx4ROzYGIzIWLhYPCx4nEjYIBjJAIB4yLwofFwcgAw0xPhsmGwYDDTswJy8/FBYDMTAmOzExHw0DCDkeOyEmEjsUAzgxCAYjFi8nMwgzLyMxBwMDFkEmIREHCwklAgI0GwZCHggdHRI2QSMjLx4OIzgzMDsnLzYSJUE5ITghNTswICE1JCw7FwMHCjMXDQYmGzkGHiQFAB4kPDAeCzYx

  • Sample

    240919-sh6bssvhql

Malware Config

Targets

    • Target

      https://11-samfw.cloud/v2/IxJCDiMnLiw1NkFBAwAsHy8kLhovOx4lFzssIDs2ByAzMUEgOzEUJTMQMCMBOyw/DxYzOjgAFDE4MC8DNQc8QBcbQTU8Ly4xLjYpDDwvIh0JFz4nPDsaPzU7LycyAy8KNBc+Py4IM0EzNi4JNAshJTwlCD8PB0IfATswHjw7ISk0Cy4CHgMeICYbOQAeCwgwHgs2JB4kDT8BFjQfLhEwGiEWBzA1AB0kITgeJS4nIRAyGyAKLhE+DDIABj8hOB4KHiUiMC4XIys8OCA5ND8UJTIAPiUyJy8wNAAvPzwAPisuJy8rLgQUCzIAMEImFiA1LgcgCjs2FDE7Bx4ROzYGIzIWLhYPCx4nEjYIBjJAIB4yLwofFwcgAw0xPhsmGwYDDTswJy8/FBYDMTAmOzExHw0DCDkeOyEmEjsUAzgxCAYjFi8nMwgzLyMxBwMDFkEmIREHCwklAgI0GwZCHggdHRI2QSMjLx4OIzgzMDsnLzYSJUE5ITghNTswICE1JCw7FwMHCjMXDQYmGzkGHiQFAB4kPDAeCzYx

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks