General

  • Target

    9aa408e2e114f4477c62192b4130ee4c3ada6b04c4b1b6f0b91916a2c2cce7d1N

  • Size

    64KB

  • Sample

    241002-mnyw1s1fpk

  • MD5

    6c4ca721fd4841cb8f658e374dd3c2b0

  • SHA1

    c66ed56bd79c45cbdf90899b766dd0058d45de69

  • SHA256

    9aa408e2e114f4477c62192b4130ee4c3ada6b04c4b1b6f0b91916a2c2cce7d1

  • SHA512

    a7ea2c3ed4053594e4ef2f6b1a68e5297e46c42da2f62b48955aecba90c914e291b2127a54527b74b502c600d2e8b15b0bd52cb4dac10309f32aef15d3f41a82

  • SSDEEP

    768:rAUJmQCcmLCXQq6fsKiJYsIkjJVzqsVG5kuGKQLddOW/p4WvEITH3/:sUNHFKQbIkHvGMdOq4y

Malware Config

Targets

    • Target

      9aa408e2e114f4477c62192b4130ee4c3ada6b04c4b1b6f0b91916a2c2cce7d1N

    • Size

      64KB

    • MD5

      6c4ca721fd4841cb8f658e374dd3c2b0

    • SHA1

      c66ed56bd79c45cbdf90899b766dd0058d45de69

    • SHA256

      9aa408e2e114f4477c62192b4130ee4c3ada6b04c4b1b6f0b91916a2c2cce7d1

    • SHA512

      a7ea2c3ed4053594e4ef2f6b1a68e5297e46c42da2f62b48955aecba90c914e291b2127a54527b74b502c600d2e8b15b0bd52cb4dac10309f32aef15d3f41a82

    • SSDEEP

      768:rAUJmQCcmLCXQq6fsKiJYsIkjJVzqsVG5kuGKQLddOW/p4WvEITH3/:sUNHFKQbIkHvGMdOq4y

    • Windows security bypass

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Indicator Removal: Clear Persistence

      remove IFEO.

    • Modifies WinLogon

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks