General

  • Target

    3f4547cb9bb464af01063a31c1a19764ae05110909e83fb2868c08db06cc5191N

  • Size

    137KB

  • Sample

    240930-zm9ncaydme

  • MD5

    7c4f6a9524e738019308518c2af00eb0

  • SHA1

    29e0f6c83efa8bb8cb103753b926b9ac3ee2076e

  • SHA256

    3f4547cb9bb464af01063a31c1a19764ae05110909e83fb2868c08db06cc5191

  • SHA512

    cdeddcad086c93d8f3a892eb48fb6522ef06833c88f595c810078ce7f1d0eae5d44baef93b2c4df4ef06a2339fa4fb72195d23b926616862b9dcaac18a11ca81

  • SSDEEP

    3072:TR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuT:+25GgFny61mra1

Malware Config

Targets

    • Target

      3f4547cb9bb464af01063a31c1a19764ae05110909e83fb2868c08db06cc5191N

    • Size

      137KB

    • MD5

      7c4f6a9524e738019308518c2af00eb0

    • SHA1

      29e0f6c83efa8bb8cb103753b926b9ac3ee2076e

    • SHA256

      3f4547cb9bb464af01063a31c1a19764ae05110909e83fb2868c08db06cc5191

    • SHA512

      cdeddcad086c93d8f3a892eb48fb6522ef06833c88f595c810078ce7f1d0eae5d44baef93b2c4df4ef06a2339fa4fb72195d23b926616862b9dcaac18a11ca81

    • SSDEEP

      3072:TR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuT:+25GgFny61mra1

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks