Resubmissions

29/09/2024, 09:54

240929-lxdrrssclc 6

29/09/2024, 09:50

240929-lvabkasbke 6

29/09/2024, 09:41

240929-lpap5syclq 4

General

  • Target

    winrar-x64-624.exe

  • Size

    3.4MB

  • Sample

    240929-lxdrrssclc

  • MD5

    15596b41dba42cdcce4f677fbbc86b6e

  • SHA1

    1ed1e69e72028150f8562bff5ca1dd745874329a

  • SHA256

    377abc9d367e61cb5c4761bf48dcfdf5bcd3822f303e0f972d7f4c8295a2ea79

  • SHA512

    d4e0d64f71027ecc6d85479542ed682359b37446cb1dccce5fa2972f152e27f3cb91a8ec0dc61270bc40038751a58982d4678efb929a3bc6d3546e072f51a9f2

  • SSDEEP

    98304:HwBOBfKt5yLFxNTZB7ktTq8K+ly8DfIbhGSqzxm:Hw/tyd3w++lz0bym

Malware Config

Targets

    • Target

      winrar-x64-624.exe

    • Size

      3.4MB

    • MD5

      15596b41dba42cdcce4f677fbbc86b6e

    • SHA1

      1ed1e69e72028150f8562bff5ca1dd745874329a

    • SHA256

      377abc9d367e61cb5c4761bf48dcfdf5bcd3822f303e0f972d7f4c8295a2ea79

    • SHA512

      d4e0d64f71027ecc6d85479542ed682359b37446cb1dccce5fa2972f152e27f3cb91a8ec0dc61270bc40038751a58982d4678efb929a3bc6d3546e072f51a9f2

    • SSDEEP

      98304:HwBOBfKt5yLFxNTZB7ktTq8K+ly8DfIbhGSqzxm:Hw/tyd3w++lz0bym

    • Checks for any installed AV software in registry

    • Downloads MZ/PE file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Enumerates processes with tasklist

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks