General

  • Target

    Login

  • Size

    67KB

  • Sample

    240927-ghnwza1cme

  • MD5

    cb389dcd35d5b8156fc1ff12fcaebba9

  • SHA1

    593e78d648260949627edd610cd0b3263c11f956

  • SHA256

    39c89d65dbd6cb717aab35852a91095b43e3ca7b7027baf129d6e796d2ef1187

  • SHA512

    a688ce0559cb7bc977ffc1a9bb5420f7173f9fc1007b304ecdcc57d141c2f6eb69d64167e07441bf5a7bea6ced42053904248aa5ca2b0e60050c90d1cadca550

  • SSDEEP

    1536:csFLwX2NUhNFZuSuAtWWxiLweIg3io/fMnho1HvENaWjpqkcSK46ZsnJfrTa5ufl:ZFLbIxu1HvENaWjpqkcSK46ZsnJfrTaa

Malware Config

Targets

    • Target

      Login

    • Size

      67KB

    • MD5

      cb389dcd35d5b8156fc1ff12fcaebba9

    • SHA1

      593e78d648260949627edd610cd0b3263c11f956

    • SHA256

      39c89d65dbd6cb717aab35852a91095b43e3ca7b7027baf129d6e796d2ef1187

    • SHA512

      a688ce0559cb7bc977ffc1a9bb5420f7173f9fc1007b304ecdcc57d141c2f6eb69d64167e07441bf5a7bea6ced42053904248aa5ca2b0e60050c90d1cadca550

    • SSDEEP

      1536:csFLwX2NUhNFZuSuAtWWxiLweIg3io/fMnho1HvENaWjpqkcSK46ZsnJfrTa5ufl:ZFLbIxu1HvENaWjpqkcSK46ZsnJfrTaa

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks