General

  • Target

    5f4a10d73a8cccc33489fceb51a4ea80b2030484dbc94f62c733ddcde0c855eaN

  • Size

    81KB

  • Sample

    240930-q892kashlh

  • MD5

    c9c295cbbea61de3a33c75b842c28290

  • SHA1

    d184c0191defbd0d91445da0be3b1a7619facf13

  • SHA256

    5f4a10d73a8cccc33489fceb51a4ea80b2030484dbc94f62c733ddcde0c855ea

  • SHA512

    77d58d62d9969ee87958d935e416afcea2ab9bffe5d5ba045eb550cc0eea8cb7260430eb24e2049db371e83fe580988415ed55d222b9cc8036b812fbb7df3087

  • SSDEEP

    1536:ZoG6KpY6Qi3yj2wyq4HwiMO10HVLCJRpsWr6cdaxPBJYYF7dxD4:jenkyfPAwiMq0RqRfbaxZJYYFE

Malware Config

Targets

    • Target

      5f4a10d73a8cccc33489fceb51a4ea80b2030484dbc94f62c733ddcde0c855eaN

    • Size

      81KB

    • MD5

      c9c295cbbea61de3a33c75b842c28290

    • SHA1

      d184c0191defbd0d91445da0be3b1a7619facf13

    • SHA256

      5f4a10d73a8cccc33489fceb51a4ea80b2030484dbc94f62c733ddcde0c855ea

    • SHA512

      77d58d62d9969ee87958d935e416afcea2ab9bffe5d5ba045eb550cc0eea8cb7260430eb24e2049db371e83fe580988415ed55d222b9cc8036b812fbb7df3087

    • SSDEEP

      1536:ZoG6KpY6Qi3yj2wyq4HwiMO10HVLCJRpsWr6cdaxPBJYYF7dxD4:jenkyfPAwiMq0RqRfbaxZJYYFE

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • Sets service image path in registry

    • Downloads MZ/PE file

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks