General

  • Target

    sample

  • Size

    64KB

  • Sample

    241012-w11qtavalg

  • MD5

    5d1be71f5e02a81f3708930a785ef012

  • SHA1

    1174c2b5d43357d52194ceb416a760f7a0c5d70d

  • SHA256

    da283bb0415748dc51d996c2a40778c53640ccf5ec12afe1cddf8693c0a0f669

  • SHA512

    2d420a9b67ed146d794ea067781b5742e90ec13cc4297e711da0b45e8fb43a4f06c2705c81c009005448872e8342485c418c69181987f368b13c8d7a9883d8e3

  • SSDEEP

    1536:O69UFLCCwNiew/nehNFZuSuWtWWxvUho1HKOwjaWcpqSNEkK56ZsnfJrTfu5vaGc:p9UFLhw6cUu1HEjaWcpqSNEkK56ZsnfH

Malware Config

Targets

    • Target

      sample

    • Size

      64KB

    • MD5

      5d1be71f5e02a81f3708930a785ef012

    • SHA1

      1174c2b5d43357d52194ceb416a760f7a0c5d70d

    • SHA256

      da283bb0415748dc51d996c2a40778c53640ccf5ec12afe1cddf8693c0a0f669

    • SHA512

      2d420a9b67ed146d794ea067781b5742e90ec13cc4297e711da0b45e8fb43a4f06c2705c81c009005448872e8342485c418c69181987f368b13c8d7a9883d8e3

    • SSDEEP

      1536:O69UFLCCwNiew/nehNFZuSuWtWWxvUho1HKOwjaWcpqSNEkK56ZsnfJrTfu5vaGc:p9UFLhw6cUu1HEjaWcpqSNEkK56ZsnfH

    • Detects Empyrean stealer

    • Empyrean Stealer

      An Open-source information stealer.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks