General
-
Target
7777.zip
-
Size
281KB
-
Sample
241006-lkxzwaxbpm
-
MD5
933bf251540a7adb0f16db7d1087973c
-
SHA1
52abddec7e99e7022fef908743088500ea283b6f
-
SHA256
3418a32a51104129f7b6a03c18ef6e2989108fe6552c49a81f56fe61ea6522c4
-
SHA512
b06172cd939093be48b29b786ef3f4beb5b39cad8bdf04937be64c899daf16e5e594cad42aeeae6488b52bc88fe79d0d1d18de5fccfcd202861f934febf0ee84
-
SSDEEP
6144:/Ouq31q28S5qx1fHVhG8AFe08Ad7iIuYC0ySiJ5hIVlBu0bBRAl:zh28eif1I8AFeVAhCf/uMOjAl
Behavioral task
behavioral1
Sample
DR4eat.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DR4eat.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
DR4eat.exe
-
Size
477KB
-
MD5
ea0711812c4f773da344e725a843712f
-
SHA1
82e87f6097e423306934a1319ef6d5191b05636b
-
SHA256
478b3048a9b82c42c029083a6cf8ef0a012147e8901a3272c3882da838c47aa6
-
SHA512
60a9bdb837af84dbfa6a761d297ffb3c7f9cd93989067e1d3b707885b5e34d5823e2aa006e727dd3b519a100494c8bfbc9a07ddd1f6015575d00937eaa208c66
-
SSDEEP
12288:Wa5KxDkM/ByYqzQsPjC/2pzYvsuTgEV11fIUWs:WNaM/QYqzQsPjC/mzWRgyN
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Privilege Escalation
Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3