General

  • Target

    b13b713fa41afd38f5756e39d2af6da7bdb43ac107afe8683d0f9b719eb7f6c8N

  • Size

    69KB

  • Sample

    240920-jts16swgql

  • MD5

    f5b73d90ba4365b2132ee65c4d1c8480

  • SHA1

    0e146a1070fc7b67a28b81343c14a85133ce7c61

  • SHA256

    b13b713fa41afd38f5756e39d2af6da7bdb43ac107afe8683d0f9b719eb7f6c8

  • SHA512

    307c4fd078759f4d60674597b7b814501dab027bb7234bc5b920e1a16ba9969fa14c9f1d96573b19771edc172dabfb38f9454d7ab814b9830c6f3e58a4cae2f8

  • SSDEEP

    1536:EJrFDMRyriCY/qXfatMp4Q2V6fIMxIpLI:0F8dCY85TE6fIMSRI

Malware Config

Targets

    • Target

      b13b713fa41afd38f5756e39d2af6da7bdb43ac107afe8683d0f9b719eb7f6c8N

    • Size

      69KB

    • MD5

      f5b73d90ba4365b2132ee65c4d1c8480

    • SHA1

      0e146a1070fc7b67a28b81343c14a85133ce7c61

    • SHA256

      b13b713fa41afd38f5756e39d2af6da7bdb43ac107afe8683d0f9b719eb7f6c8

    • SHA512

      307c4fd078759f4d60674597b7b814501dab027bb7234bc5b920e1a16ba9969fa14c9f1d96573b19771edc172dabfb38f9454d7ab814b9830c6f3e58a4cae2f8

    • SSDEEP

      1536:EJrFDMRyriCY/qXfatMp4Q2V6fIMxIpLI:0F8dCY85TE6fIMSRI

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks