General

  • Target

    7777.zip

  • Size

    281KB

  • Sample

    241006-lkxzwaxbpm

  • MD5

    933bf251540a7adb0f16db7d1087973c

  • SHA1

    52abddec7e99e7022fef908743088500ea283b6f

  • SHA256

    3418a32a51104129f7b6a03c18ef6e2989108fe6552c49a81f56fe61ea6522c4

  • SHA512

    b06172cd939093be48b29b786ef3f4beb5b39cad8bdf04937be64c899daf16e5e594cad42aeeae6488b52bc88fe79d0d1d18de5fccfcd202861f934febf0ee84

  • SSDEEP

    6144:/Ouq31q28S5qx1fHVhG8AFe08Ad7iIuYC0ySiJ5hIVlBu0bBRAl:zh28eif1I8AFeVAhCf/uMOjAl

Malware Config

Targets

    • Target

      DR4eat.exe

    • Size

      477KB

    • MD5

      ea0711812c4f773da344e725a843712f

    • SHA1

      82e87f6097e423306934a1319ef6d5191b05636b

    • SHA256

      478b3048a9b82c42c029083a6cf8ef0a012147e8901a3272c3882da838c47aa6

    • SHA512

      60a9bdb837af84dbfa6a761d297ffb3c7f9cd93989067e1d3b707885b5e34d5823e2aa006e727dd3b519a100494c8bfbc9a07ddd1f6015575d00937eaa208c66

    • SSDEEP

      12288:Wa5KxDkM/ByYqzQsPjC/2pzYvsuTgEV11fIUWs:WNaM/QYqzQsPjC/mzWRgyN

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks