General

  • Target

    MEMZ-virus

  • Size

    248KB

  • Sample

    241031-1m879askhw

  • MD5

    b1256cd74e8b6a1c50645231e32f1b90

  • SHA1

    e24e73e4654a02ef46dc18d53dc32fe48fdd8b21

  • SHA256

    a50bd90d9984f5dedf7197e2e9a3b33460135026ddf2612bbb96847a1c4d0b2c

  • SHA512

    b99a2c1ba374708d2a3e2c89bc009bb40cc4f26bd68826deae0aaf91b20995f19081105313188ad42b77bc7347c208704a0d65f711c34dacfd5098bd22d4e5ac

  • SSDEEP

    6144:bRoukpOL/saqkPV9FemLtcsDSsmwx9EvZJT3CqbMrhryf65NRPaCieMjAkvCJv1m:FoukpOL/saqkPV9FemLtcsDSsmwx9Evb

Malware Config

Targets

    • Target

      MEMZ-virus

    • Size

      248KB

    • MD5

      b1256cd74e8b6a1c50645231e32f1b90

    • SHA1

      e24e73e4654a02ef46dc18d53dc32fe48fdd8b21

    • SHA256

      a50bd90d9984f5dedf7197e2e9a3b33460135026ddf2612bbb96847a1c4d0b2c

    • SHA512

      b99a2c1ba374708d2a3e2c89bc009bb40cc4f26bd68826deae0aaf91b20995f19081105313188ad42b77bc7347c208704a0d65f711c34dacfd5098bd22d4e5ac

    • SSDEEP

      6144:bRoukpOL/saqkPV9FemLtcsDSsmwx9EvZJT3CqbMrhryf65NRPaCieMjAkvCJv1m:FoukpOL/saqkPV9FemLtcsDSsmwx9Evb

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Possible privilege escalation attempt

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Network Share Discovery

      Attempt to gather information on host network.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks