General

  • Target

    Screenshot 2024-09-18 11.29.38 AM.png

  • Size

    437KB

  • Sample

    241023-txzcga1hmm

  • MD5

    f213ad7acdf0fcf66583ae3a2449be77

  • SHA1

    55866e4a832b3a2461bb06b55cfb097147ab8af5

  • SHA256

    68051894fc753201c13685d506b35bee7d227e9ac59ee9b3d6f31c0a6c748b41

  • SHA512

    b99c331ba81045b9ee51af67c2bbe847edd45315a95a375fa58c02f39b93c8ef5d4997dd0555dbb4c8c3f46516e09eb1c3c090f460e9d92ba0107fb58a4899e9

  • SSDEEP

    12288:uDF1Gc5gggHKJ5VUdmGm09eJKX+mN0Ih5KpD8iuD:0FJgNHKGc70GIvgXuD

Malware Config

Targets

    • Target

      Screenshot 2024-09-18 11.29.38 AM.png

    • Size

      437KB

    • MD5

      f213ad7acdf0fcf66583ae3a2449be77

    • SHA1

      55866e4a832b3a2461bb06b55cfb097147ab8af5

    • SHA256

      68051894fc753201c13685d506b35bee7d227e9ac59ee9b3d6f31c0a6c748b41

    • SHA512

      b99c331ba81045b9ee51af67c2bbe847edd45315a95a375fa58c02f39b93c8ef5d4997dd0555dbb4c8c3f46516e09eb1c3c090f460e9d92ba0107fb58a4899e9

    • SSDEEP

      12288:uDF1Gc5gggHKJ5VUdmGm09eJKX+mN0Ih5KpD8iuD:0FJgNHKGc70GIvgXuD

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks