Resubmissions

18-10-2024 10:15

241018-mageta1eph 8

18-10-2024 10:14

241018-l9r5xstgkl 3

18-10-2024 10:12

241018-l8j3xs1drb 3

General

  • Target

    iVault.py

  • Size

    746KB

  • Sample

    241018-mageta1eph

  • MD5

    08990be6640354d6c8558cf88c3f18e5

  • SHA1

    a92a9751e57b81254f09a474f9e53367f1fc9306

  • SHA256

    12d5eea4a11a119a6d722aecae66ff0b71a24cdfaefa42a34cf53d5a06415600

  • SHA512

    7717a14bb9446c5f74f22d8cc33ac166a06cf1c75cda7eb9279e0779cda9a631c376cbc5d13e8d9ff7b46008bc12ce139f0c7f8b94a11f7b2f498f279cbe0a52

  • SSDEEP

    768:fQ9esPysAEw6S6bWgKDE0chEgfaWE2/ibICxEmSR0sUR3yHwkBzF4BXUu2lcwZi3:RsPy9Ew4bWhRgfaXmmkw5ciwZsb

Malware Config

Targets

    • Target

      iVault.py

    • Size

      746KB

    • MD5

      08990be6640354d6c8558cf88c3f18e5

    • SHA1

      a92a9751e57b81254f09a474f9e53367f1fc9306

    • SHA256

      12d5eea4a11a119a6d722aecae66ff0b71a24cdfaefa42a34cf53d5a06415600

    • SHA512

      7717a14bb9446c5f74f22d8cc33ac166a06cf1c75cda7eb9279e0779cda9a631c376cbc5d13e8d9ff7b46008bc12ce139f0c7f8b94a11f7b2f498f279cbe0a52

    • SSDEEP

      768:fQ9esPysAEw6S6bWgKDE0chEgfaWE2/ibICxEmSR0sUR3yHwkBzF4BXUu2lcwZi3:RsPy9Ew4bWhRgfaXmmkw5ciwZsb

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks