General

  • Target

    DT(Eng).exe

  • Size

    116KB

  • Sample

    241030-sgzgvswcjc

  • MD5

    a4d499dab4e1f068f394745d1d370235

  • SHA1

    853dc5e34e429a3fa4eebc56bdf6950a06ee7873

  • SHA256

    e0b9ea781ddcbd6e0235f6cbd6477a529cfb695a71698781376e8e0a126e6ef1

  • SHA512

    c4309180d3acec139f34da61a4d3c4cdfe06eb6d1d576d3c5fe92d3415782b6a85b5bbd5a28c81baefe0ca7733f81fc0caa384a23f2849e83e80463af11eb53f

  • SSDEEP

    3072:I9D4URXVVuxOx0lqWqVYd5D3znndxolQ7:mTx0lq8VLn4a

Malware Config

Targets

    • Target

      DT(Eng).exe

    • Size

      116KB

    • MD5

      a4d499dab4e1f068f394745d1d370235

    • SHA1

      853dc5e34e429a3fa4eebc56bdf6950a06ee7873

    • SHA256

      e0b9ea781ddcbd6e0235f6cbd6477a529cfb695a71698781376e8e0a126e6ef1

    • SHA512

      c4309180d3acec139f34da61a4d3c4cdfe06eb6d1d576d3c5fe92d3415782b6a85b5bbd5a28c81baefe0ca7733f81fc0caa384a23f2849e83e80463af11eb53f

    • SSDEEP

      3072:I9D4URXVVuxOx0lqWqVYd5D3znndxolQ7:mTx0lq8VLn4a

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks