General

  • Target

    64e88eb34df6a06ab42158005be3f292a4fe8a78b8f1c4ee0e32c849ade8a037

  • Size

    34KB

  • Sample

    240925-15kmlstepf

  • MD5

    fb49b57c093014a496d7e40ab1a96383

  • SHA1

    3ccb31611b8e80b5b76ca9b315d330c9910a4052

  • SHA256

    64e88eb34df6a06ab42158005be3f292a4fe8a78b8f1c4ee0e32c849ade8a037

  • SHA512

    277cdaec9630f6a55d09c5a0a3a6722e467eadabed69fe95868ebda6c33fa9d6b39dce46a37d6b20e5efde766d89f9e0e665d53f626cc13dc1da1655e070f0a1

  • SSDEEP

    768:tQbuQRy2UjmUndnlTttxDn+3jiSkjRY6AB7kKfYoJ+ifBEewzKO5C:QuQRylaUDTDxDXjy6AB7koYy2To

Malware Config

Targets

    • Target

      64e88eb34df6a06ab42158005be3f292a4fe8a78b8f1c4ee0e32c849ade8a037

    • Size

      34KB

    • MD5

      fb49b57c093014a496d7e40ab1a96383

    • SHA1

      3ccb31611b8e80b5b76ca9b315d330c9910a4052

    • SHA256

      64e88eb34df6a06ab42158005be3f292a4fe8a78b8f1c4ee0e32c849ade8a037

    • SHA512

      277cdaec9630f6a55d09c5a0a3a6722e467eadabed69fe95868ebda6c33fa9d6b39dce46a37d6b20e5efde766d89f9e0e665d53f626cc13dc1da1655e070f0a1

    • SSDEEP

      768:tQbuQRy2UjmUndnlTttxDn+3jiSkjRY6AB7kKfYoJ+ifBEewzKO5C:QuQRylaUDTDxDXjy6AB7koYy2To

    • Windows security bypass

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Event Triggered Execution: Image File Execution Options Injection

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Indicator Removal: Clear Persistence

      remove IFEO.

    • Modifies WinLogon

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks