Resubmissions

17/10/2024, 19:07

241017-xsmdwstfmm 3

17/10/2024, 19:02

241017-xpr5zazhkb 8

General

  • Target

    banner.PNG

  • Size

    544KB

  • Sample

    241017-xpr5zazhkb

  • MD5

    3a531656b6bdf14476d14fc6d643dd75

  • SHA1

    7cc8633d35e1e7bfa0357cc3f47c3c025bf56a0c

  • SHA256

    4794bed7e8edba30084dab52f27b1fdfe69d5a31d6bf8cdec48214760acde066

  • SHA512

    f120643e9afa1cf1d3e5eccc39444452a0197898e5a9c627a11291a7854150497b8d5e566f4c373ae7c97f6536f82417afa49f5fd46839d6e83384c89eb896cf

  • SSDEEP

    12288:gcqOZRLk6vUTJU12bie1m+hQlnYIejdBuAbJ4qxMQKrfFYH5h5:bDZV3UTe82Em+hQlnYIMTt4quNSH5j

Malware Config

Targets

    • Target

      banner.PNG

    • Size

      544KB

    • MD5

      3a531656b6bdf14476d14fc6d643dd75

    • SHA1

      7cc8633d35e1e7bfa0357cc3f47c3c025bf56a0c

    • SHA256

      4794bed7e8edba30084dab52f27b1fdfe69d5a31d6bf8cdec48214760acde066

    • SHA512

      f120643e9afa1cf1d3e5eccc39444452a0197898e5a9c627a11291a7854150497b8d5e566f4c373ae7c97f6536f82417afa49f5fd46839d6e83384c89eb896cf

    • SSDEEP

      12288:gcqOZRLk6vUTJU12bie1m+hQlnYIejdBuAbJ4qxMQKrfFYH5h5:bDZV3UTe82Em+hQlnYIMTt4quNSH5j

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks