General

  • Target

    6bdaaf7003428aab3c876e0d9002b270ef779cae78e47258bdb7c0f789d65b2fN.exe

  • Size

    51KB

  • Sample

    240925-ybjr4steqn

  • MD5

    f2d8d41f9a604529ed2c93f0e6893c00

  • SHA1

    d0d21affe3fe15d45bb68aa0241a11c9a21e6989

  • SHA256

    6bdaaf7003428aab3c876e0d9002b270ef779cae78e47258bdb7c0f789d65b2f

  • SHA512

    ca41f44ce8e3db0cf609cacdda6be903bb1af7a19697b3318bc30891b0f9cd73c237852df43ffed189fe2628fe4c04c01098ecffb99eee1ae52efa907502d24a

  • SSDEEP

    768:nNAGAkIo/juokwoL7627d9rIiClJAxiFkJT22euOiya6lHOYxY0x0KS3m:nNJb/HkwoLe29UjQ4wqQOLIMVnS3m

Malware Config

Targets

    • Target

      6bdaaf7003428aab3c876e0d9002b270ef779cae78e47258bdb7c0f789d65b2fN.exe

    • Size

      51KB

    • MD5

      f2d8d41f9a604529ed2c93f0e6893c00

    • SHA1

      d0d21affe3fe15d45bb68aa0241a11c9a21e6989

    • SHA256

      6bdaaf7003428aab3c876e0d9002b270ef779cae78e47258bdb7c0f789d65b2f

    • SHA512

      ca41f44ce8e3db0cf609cacdda6be903bb1af7a19697b3318bc30891b0f9cd73c237852df43ffed189fe2628fe4c04c01098ecffb99eee1ae52efa907502d24a

    • SSDEEP

      768:nNAGAkIo/juokwoL7627d9rIiClJAxiFkJT22euOiya6lHOYxY0x0KS3m:nNJb/HkwoLe29UjQ4wqQOLIMVnS3m

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks