General

  • Target

    3baafda6c48627691d843e547f4bbb0591f8351cf8775cb9a0abf6272312ff61N.exe

  • Size

    797KB

  • Sample

    240927-geyl1a1bmd

  • MD5

    eb56401f38c13069475ed928637a3ad0

  • SHA1

    22e326efff5a3c60cd3937f740aca74e97cfb09a

  • SHA256

    3baafda6c48627691d843e547f4bbb0591f8351cf8775cb9a0abf6272312ff61

  • SHA512

    60a3a3b6391c0133e41b05a7245355316127426e81b5f83456a6f417e8bb043ac040a26e45aa162b665836aaee904e811734ea56d7b13a1f058c39300e9894bf

  • SSDEEP

    12288:R85EaY+n2KGBS3H514ZfX4yemLd0gXLAlEZui+XGTQ70NtBWggHtm3U:R0Yn03UZ/Xd9LAlExd+GtBWggI3U

Malware Config

Targets

    • Target

      3baafda6c48627691d843e547f4bbb0591f8351cf8775cb9a0abf6272312ff61N.exe

    • Size

      797KB

    • MD5

      eb56401f38c13069475ed928637a3ad0

    • SHA1

      22e326efff5a3c60cd3937f740aca74e97cfb09a

    • SHA256

      3baafda6c48627691d843e547f4bbb0591f8351cf8775cb9a0abf6272312ff61

    • SHA512

      60a3a3b6391c0133e41b05a7245355316127426e81b5f83456a6f417e8bb043ac040a26e45aa162b665836aaee904e811734ea56d7b13a1f058c39300e9894bf

    • SSDEEP

      12288:R85EaY+n2KGBS3H514ZfX4yemLd0gXLAlEZui+XGTQ70NtBWggHtm3U:R0Yn03UZ/Xd9LAlExd+GtBWggI3U

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks