General

  • Target

    setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe.v

  • Size

    116.4MB

  • Sample

    241015-e9nzyazakq

  • MD5

    d164724461b25eb363a1a31d3333cc65

  • SHA1

    6c1192a6e79fbc1b9c5d415fa98567d87be0b2c9

  • SHA256

    1bed372c2eac53075a040d6f2aae22659e0e0fee2ce21835dd95e3c580cc1e05

  • SHA512

    bdb591a44e49cddb56e130b67d4c1f202b362cb64e53ba0608a1408863147f9953d57f17cdafdd5946061318f0825e950dd690f92ace8b88d582a94ad8452548

  • SSDEEP

    3145728:jLH+5LLf4eHgCo6iYPR0vGQNb5ZdqIUhEb0TsT8SO5i:fe5XHggiYPGvDh7dqx2b0T1SO5i

Malware Config

Targets

    • Target

      setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe.v

    • Size

      116.4MB

    • MD5

      d164724461b25eb363a1a31d3333cc65

    • SHA1

      6c1192a6e79fbc1b9c5d415fa98567d87be0b2c9

    • SHA256

      1bed372c2eac53075a040d6f2aae22659e0e0fee2ce21835dd95e3c580cc1e05

    • SHA512

      bdb591a44e49cddb56e130b67d4c1f202b362cb64e53ba0608a1408863147f9953d57f17cdafdd5946061318f0825e950dd690f92ace8b88d582a94ad8452548

    • SSDEEP

      3145728:jLH+5LLf4eHgCo6iYPR0vGQNb5ZdqIUhEb0TsT8SO5i:fe5XHggiYPGvDh7dqx2b0T1SO5i

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Stops running service(s)

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks