General
-
Target
iVault.py
-
Size
746KB
-
Sample
241018-mageta1eph
-
MD5
08990be6640354d6c8558cf88c3f18e5
-
SHA1
a92a9751e57b81254f09a474f9e53367f1fc9306
-
SHA256
12d5eea4a11a119a6d722aecae66ff0b71a24cdfaefa42a34cf53d5a06415600
-
SHA512
7717a14bb9446c5f74f22d8cc33ac166a06cf1c75cda7eb9279e0779cda9a631c376cbc5d13e8d9ff7b46008bc12ce139f0c7f8b94a11f7b2f498f279cbe0a52
-
SSDEEP
768:fQ9esPysAEw6S6bWgKDE0chEgfaWE2/ibICxEmSR0sUR3yHwkBzF4BXUu2lcwZi3:RsPy9Ew4bWhRgfaXmmkw5ciwZsb
Static task
static1
Behavioral task
behavioral1
Sample
iVault.py
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
iVault.py
-
Size
746KB
-
MD5
08990be6640354d6c8558cf88c3f18e5
-
SHA1
a92a9751e57b81254f09a474f9e53367f1fc9306
-
SHA256
12d5eea4a11a119a6d722aecae66ff0b71a24cdfaefa42a34cf53d5a06415600
-
SHA512
7717a14bb9446c5f74f22d8cc33ac166a06cf1c75cda7eb9279e0779cda9a631c376cbc5d13e8d9ff7b46008bc12ce139f0c7f8b94a11f7b2f498f279cbe0a52
-
SSDEEP
768:fQ9esPysAEw6S6bWgKDE0chEgfaWE2/ibICxEmSR0sUR3yHwkBzF4BXUu2lcwZi3:RsPy9Ew4bWhRgfaXmmkw5ciwZsb
Score8/10-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1