Resubmissions

27/09/2024, 11:39

240927-nsb4gstapd 3

27/09/2024, 11:36

240927-nqwp4szhrm 7

27/09/2024, 11:32

240927-nnrclszhjr 3

General

  • Target

    import requests.txt

  • Size

    614B

  • Sample

    240927-nqwp4szhrm

  • MD5

    9bd735d2b90d0afc504b1d5a4a958fa7

  • SHA1

    6b7c1958e01ee57b7782ce6c4662ed999e77fad7

  • SHA256

    dd192aefb82f33742283dafcf4edbc1bee26574a0d2aacfdb8b46569e773dda6

  • SHA512

    944d8c2863fd2cbfb897bcf0ce4e5f825c3ce9da2ccfe1090d3da2b9f8382d5727351e019f597105c642169e8f65c6ea8f29c8da507fe17b75c882cadb9bfaac

Malware Config

Targets

    • Target

      import requests.txt

    • Size

      614B

    • MD5

      9bd735d2b90d0afc504b1d5a4a958fa7

    • SHA1

      6b7c1958e01ee57b7782ce6c4662ed999e77fad7

    • SHA256

      dd192aefb82f33742283dafcf4edbc1bee26574a0d2aacfdb8b46569e773dda6

    • SHA512

      944d8c2863fd2cbfb897bcf0ce4e5f825c3ce9da2ccfe1090d3da2b9f8382d5727351e019f597105c642169e8f65c6ea8f29c8da507fe17b75c882cadb9bfaac

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks