Resubmissions

03-10-2024 14:37

241003-ry6f3azgnm 10

02-10-2024 18:00

241002-wlawvazanm 10

General

  • Target

    sim.py

  • Size

    20KB

  • Sample

    241003-ry6f3azgnm

  • MD5

    0c472b2e6618aca50cb2dff20cd51562

  • SHA1

    df5a0d16ee26aa97087c9d1cd28e08632bcd6000

  • SHA256

    3cfb5e4c47015ffff48609e8400770850a61d53e59259cba2a0b1c36a88c9aab

  • SHA512

    17ac9ba0eb34fb86bdc2cec890f54b0a802b8535c05bfa8479e69a63c352eba51b9df04eb66b03a431921de7bde368d5a7a2edb6217b7b2871f4cdc1a114a1dc

  • SSDEEP

    384:GRExTcSVqPb61rNykWy/k74Fft1froMzZOguu:NxTcSVqPb6N/7oIeu

Malware Config

Targets

    • Target

      sim.py

    • Size

      20KB

    • MD5

      0c472b2e6618aca50cb2dff20cd51562

    • SHA1

      df5a0d16ee26aa97087c9d1cd28e08632bcd6000

    • SHA256

      3cfb5e4c47015ffff48609e8400770850a61d53e59259cba2a0b1c36a88c9aab

    • SHA512

      17ac9ba0eb34fb86bdc2cec890f54b0a802b8535c05bfa8479e69a63c352eba51b9df04eb66b03a431921de7bde368d5a7a2edb6217b7b2871f4cdc1a114a1dc

    • SSDEEP

      384:GRExTcSVqPb61rNykWy/k74Fft1froMzZOguu:NxTcSVqPb6N/7oIeu

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks