Resubmissions

02-10-2024 01:24

241002-bswfxazfmm 10

29-09-2024 17:59

240929-wkrszaxgjd 8

General

  • Target

    png.png

  • Size

    64KB

  • Sample

    241002-bswfxazfmm

  • MD5

    fea57639224bfb64aecab7c821757a88

  • SHA1

    26881e715155700e8e93aafeb116c79e307289c0

  • SHA256

    9895322791eff6a39516d3d73efc4584f4db8cb735f6bdf7fcadb8d38411950c

  • SHA512

    155ad818d811b4e07aef07d4e67347320e7e6b358cbde7e15df9ba360382da5771ff1d50d47c8c3a6653ab319e993a97fac0f8cf42a730909b681be5ed845d39

  • SSDEEP

    1536:lhUNQav6UZcZatsiMy2GyfKT4YLGjIgOtI3DfY2I:k2+6+xBKKT4YpHtIrVI

Malware Config

Targets

    • Target

      png.png

    • Size

      64KB

    • MD5

      fea57639224bfb64aecab7c821757a88

    • SHA1

      26881e715155700e8e93aafeb116c79e307289c0

    • SHA256

      9895322791eff6a39516d3d73efc4584f4db8cb735f6bdf7fcadb8d38411950c

    • SHA512

      155ad818d811b4e07aef07d4e67347320e7e6b358cbde7e15df9ba360382da5771ff1d50d47c8c3a6653ab319e993a97fac0f8cf42a730909b681be5ed845d39

    • SSDEEP

      1536:lhUNQav6UZcZatsiMy2GyfKT4YLGjIgOtI3DfY2I:k2+6+xBKKT4YpHtIrVI

    • Modifies WinLogon for persistence

    • Modifies Windows Defender Real-time Protection settings

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables use of System Restore points

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks