General

  • Target

    2024-10-17_fdcc89ac9f7114ab9f6210dac608e398_goldeneye

  • Size

    180KB

  • Sample

    241017-n3wkwazcpq

  • MD5

    fdcc89ac9f7114ab9f6210dac608e398

  • SHA1

    e2025fc282054cb2f2a78e779d4ff3cfb66c505e

  • SHA256

    0cd340a700c22bbdeda6d2d25adb9c19264817413e20c944e0defb72b569cc44

  • SHA512

    a5e8fe62d804b262b3b21b91c85e47970b2aaa299c7a0b6ab2adbd0dd4935177ecb49ec17bb10a7635eec99539de5dc6499a25aa49b6e3292504fea42ebd3983

  • SSDEEP

    3072:jEGh0oolfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGel5eKcAEc

Malware Config

Targets

    • Target

      2024-10-17_fdcc89ac9f7114ab9f6210dac608e398_goldeneye

    • Size

      180KB

    • MD5

      fdcc89ac9f7114ab9f6210dac608e398

    • SHA1

      e2025fc282054cb2f2a78e779d4ff3cfb66c505e

    • SHA256

      0cd340a700c22bbdeda6d2d25adb9c19264817413e20c944e0defb72b569cc44

    • SHA512

      a5e8fe62d804b262b3b21b91c85e47970b2aaa299c7a0b6ab2adbd0dd4935177ecb49ec17bb10a7635eec99539de5dc6499a25aa49b6e3292504fea42ebd3983

    • SSDEEP

      3072:jEGh0oolfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGel5eKcAEc

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Deletes itself

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks