General

  • Target

    VC_redist.x86 (1).exe

  • Size

    13.2MB

  • Sample

    240930-ra6rxsyfqq

  • MD5

    8457542fd4be74cb2c3a92b3386ae8e9

  • SHA1

    198722b4f5fc62721910569d9d926dce22730c22

  • SHA256

    a32dd41eaab0c5e1eaa78be3c0bb73b48593de8d97a7510b97de3fd993538600

  • SHA512

    91a6283f774f9e2338b65aa835156854e9e76aed32f821b13cfd070dd6c87e1542ce2d5845beb5e4af1ddb102314bb6e0ad6214d896bb3e387590a01eae0c182

  • SSDEEP

    393216:x3RwlptVYmfr7yBG/4uOzH01/Nc1eJ/RXZMPDyiX:xGpttD7yBG/jx1/N/tZUDJ

Malware Config

Targets

    • Target

      VC_redist.x86 (1).exe

    • Size

      13.2MB

    • MD5

      8457542fd4be74cb2c3a92b3386ae8e9

    • SHA1

      198722b4f5fc62721910569d9d926dce22730c22

    • SHA256

      a32dd41eaab0c5e1eaa78be3c0bb73b48593de8d97a7510b97de3fd993538600

    • SHA512

      91a6283f774f9e2338b65aa835156854e9e76aed32f821b13cfd070dd6c87e1542ce2d5845beb5e4af1ddb102314bb6e0ad6214d896bb3e387590a01eae0c182

    • SSDEEP

      393216:x3RwlptVYmfr7yBG/4uOzH01/Nc1eJ/RXZMPDyiX:xGpttD7yBG/jx1/N/tZUDJ

    • UAC bypass

    • Windows security bypass

    • Sets service image path in registry

    • Windows security modification

    • Adds Run key to start application

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks