General

  • Target

    eme.txt

  • Size

    26B

  • Sample

    241006-bkl79syckq

  • MD5

    444583c44b1c30fdbf0e685442dfa77b

  • SHA1

    407418af781e4df18875dbd7c89a12cd6e113e5c

  • SHA256

    5dcbacdf049094139396834cfa54b4b773f539d09e1c8c751634325c27e2cd3f

  • SHA512

    2f04cffa8770fd903b86cda08ba6362ac7db05a7bf170a3b58fcc5d1c26612a2c44bb524b1b4c5b6855103432c10cb950bbddfcdbd0a134253023e796331b055

Malware Config

Targets

    • Target

      eme.txt

    • Size

      26B

    • MD5

      444583c44b1c30fdbf0e685442dfa77b

    • SHA1

      407418af781e4df18875dbd7c89a12cd6e113e5c

    • SHA256

      5dcbacdf049094139396834cfa54b4b773f539d09e1c8c751634325c27e2cd3f

    • SHA512

      2f04cffa8770fd903b86cda08ba6362ac7db05a7bf170a3b58fcc5d1c26612a2c44bb524b1b4c5b6855103432c10cb950bbddfcdbd0a134253023e796331b055

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks