General

  • Target

    empyrean-main.zip

  • Size

    458KB

  • Sample

    241002-szdywaxekb

  • MD5

    6535abdad3ba947fa280b8d5f836751b

  • SHA1

    5c7d20d35bcd2049fea5c07ad4d83e4e0e2fb494

  • SHA256

    15f5346f636fa7879882f23611d46da7d7fab3e03cf75366f8721fe54804f8fd

  • SHA512

    5edc1bac7c636d2488578d97544cedd18f61124f2a732b49ffd891aeac00a19af6dc4c42e8e4c9e52f5ae0e908f059219f0ceae698d9084453335877bea132a1

  • SSDEEP

    12288:oHl1OgPc6NQpZZbzYQqKevezSE3l52fsl:oH26CpZNUvezH52w

Malware Config

Targets

    • Target

      empyrean-main.zip

    • Size

      458KB

    • MD5

      6535abdad3ba947fa280b8d5f836751b

    • SHA1

      5c7d20d35bcd2049fea5c07ad4d83e4e0e2fb494

    • SHA256

      15f5346f636fa7879882f23611d46da7d7fab3e03cf75366f8721fe54804f8fd

    • SHA512

      5edc1bac7c636d2488578d97544cedd18f61124f2a732b49ffd891aeac00a19af6dc4c42e8e4c9e52f5ae0e908f059219f0ceae698d9084453335877bea132a1

    • SSDEEP

      12288:oHl1OgPc6NQpZZbzYQqKevezSE3l52fsl:oH26CpZNUvezH52w

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks