General

  • Target

    sample

  • Size

    20KB

  • Sample

    241023-x14yxaxhmq

  • MD5

    f19429e3982fd8ecc171f73844add83a

  • SHA1

    519114fa123c947717face47ab5b0fa26744dabd

  • SHA256

    04850ba2bd7f41dde5e9e035b65063f11ef69bf985918f2e3ae73770bcf52508

  • SHA512

    5aaf114d48e16822ce07055d2064c2a704afa56aab3d36a4ddc545e2b720568a450a7bd6f35736070daecc64e742210255cef21e9d4f4042febbd112e50be606

  • SSDEEP

    384:JslHbxFnaospa1ocy4584lbGaOMvhpNa+I3nro2REu4Y0wM1Ocfe1xCejiw:C1Fb1ocy45jEahJpN5IXrEu4Y0wM1dwn

Malware Config

Targets

    • Target

      sample

    • Size

      20KB

    • MD5

      f19429e3982fd8ecc171f73844add83a

    • SHA1

      519114fa123c947717face47ab5b0fa26744dabd

    • SHA256

      04850ba2bd7f41dde5e9e035b65063f11ef69bf985918f2e3ae73770bcf52508

    • SHA512

      5aaf114d48e16822ce07055d2064c2a704afa56aab3d36a4ddc545e2b720568a450a7bd6f35736070daecc64e742210255cef21e9d4f4042febbd112e50be606

    • SSDEEP

      384:JslHbxFnaospa1ocy4584lbGaOMvhpNa+I3nro2REu4Y0wM1Ocfe1xCejiw:C1Fb1ocy45jEahJpN5IXrEu4Y0wM1dwn

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Uses Session Manager for persistence

      Creates Session Manager registry key to run executable early in system boot.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks