General
-
Target
f5bb736e45b278f22bbb639bf1441f6dab2baf99405a9a92e56d64d6d2fa92feN
-
Size
1.9MB
-
Sample
240920-g8kbgasgmf
-
MD5
e56254ac75b95507b3d25ec4f78f0cf0
-
SHA1
29abeeb052ff823e81c67a81efa3d1608766021f
-
SHA256
f5bb736e45b278f22bbb639bf1441f6dab2baf99405a9a92e56d64d6d2fa92fe
-
SHA512
77df20e8c51a2140bced86e3f9c24530cadff79bb6b1b69167cb6593d499e154e38106687dd8851802ff4aabbc3c7aae3e20da560c720603c55a7930f154e376
-
SSDEEP
24576:3uhaTBqeZJ8NI8NeZJ8NI8LBKeZJ8NI8NeZJ8NI8LBKeZJ8NI8NeZJ8NI8+OM:Yg8a8F8a8F8a8M
Behavioral task
behavioral1
Sample
f5bb736e45b278f22bbb639bf1441f6dab2baf99405a9a92e56d64d6d2fa92feN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5bb736e45b278f22bbb639bf1441f6dab2baf99405a9a92e56d64d6d2fa92feN.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
f5bb736e45b278f22bbb639bf1441f6dab2baf99405a9a92e56d64d6d2fa92feN
-
Size
1.9MB
-
MD5
e56254ac75b95507b3d25ec4f78f0cf0
-
SHA1
29abeeb052ff823e81c67a81efa3d1608766021f
-
SHA256
f5bb736e45b278f22bbb639bf1441f6dab2baf99405a9a92e56d64d6d2fa92fe
-
SHA512
77df20e8c51a2140bced86e3f9c24530cadff79bb6b1b69167cb6593d499e154e38106687dd8851802ff4aabbc3c7aae3e20da560c720603c55a7930f154e376
-
SSDEEP
24576:3uhaTBqeZJ8NI8NeZJ8NI8LBKeZJ8NI8NeZJ8NI8LBKeZJ8NI8NeZJ8NI8+OM:Yg8a8F8a8F8a8M
-
Modifies visibility of file extensions in Explorer
-
Blocks application from running via registry modification
Adds application to list of disallowed applications.
-
Event Triggered Execution: Image File Execution Options Injection
-
Executes dropped EXE
-
Loads dropped DLL
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Indicator Removal
1File Deletion
1Modify Registry
1