General

  • Target

    4fa03f144f426d8b7b8004fe7bc3d6f9963b5198ebdf8c6e59f0b77dddf3d764

  • Size

    93KB

  • Sample

    241012-1hsdyasfle

  • MD5

    5a81c1cd711a8d1bd71d97742f59ac65

  • SHA1

    7c85f1632576f983321e3320422f772db06c1b0e

  • SHA256

    4fa03f144f426d8b7b8004fe7bc3d6f9963b5198ebdf8c6e59f0b77dddf3d764

  • SHA512

    27edad49d29296657e98e8c5905996b2aacabd5ef9206b4dc92f703bf666ad31b9958559c580dafe4e758c9b163e8f1f46586d9a82d5c779e56f4e7a65b1eeab

  • SSDEEP

    1536:+HxCaqYLXJOfEbvdTvqGORq0H/waHXxoqNFcMeYxoPRR:+Hx8YL02HamwFDoPv

Malware Config

Targets

    • Target

      4fa03f144f426d8b7b8004fe7bc3d6f9963b5198ebdf8c6e59f0b77dddf3d764

    • Size

      93KB

    • MD5

      5a81c1cd711a8d1bd71d97742f59ac65

    • SHA1

      7c85f1632576f983321e3320422f772db06c1b0e

    • SHA256

      4fa03f144f426d8b7b8004fe7bc3d6f9963b5198ebdf8c6e59f0b77dddf3d764

    • SHA512

      27edad49d29296657e98e8c5905996b2aacabd5ef9206b4dc92f703bf666ad31b9958559c580dafe4e758c9b163e8f1f46586d9a82d5c779e56f4e7a65b1eeab

    • SSDEEP

      1536:+HxCaqYLXJOfEbvdTvqGORq0H/waHXxoqNFcMeYxoPRR:+Hx8YL02HamwFDoPv

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks