General
-
Target
f53131d88d34e46d656859cea34fa48d548ae7295c6d034daeecbf7160e18ab9
-
Size
22KB
-
Sample
241031-h1p3es1pey
-
MD5
27542ec9deac08845db175f955c8a4ca
-
SHA1
25e032ad9a6864395f16d935e557965eeb2ea360
-
SHA256
f53131d88d34e46d656859cea34fa48d548ae7295c6d034daeecbf7160e18ab9
-
SHA512
915cddf29f6f5daef22433498ab85856db36e25540ae9cbbde9a25a616781f2ccb262f64c9475cbd46629aba76b9c84e8344c36e546f13c9d31ccde3a131e906
-
SSDEEP
384:UBWoC5GDr6wc/w3HgM6vDUTAXBGCVf4WVlFvXfR4nsHCaJ97Oi:rRkiLw3HsDSARGG/Nim7
Behavioral task
behavioral1
Sample
f53131d88d34e46d656859cea34fa48d548ae7295c6d034daeecbf7160e18ab9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f53131d88d34e46d656859cea34fa48d548ae7295c6d034daeecbf7160e18ab9.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
f53131d88d34e46d656859cea34fa48d548ae7295c6d034daeecbf7160e18ab9
-
Size
22KB
-
MD5
27542ec9deac08845db175f955c8a4ca
-
SHA1
25e032ad9a6864395f16d935e557965eeb2ea360
-
SHA256
f53131d88d34e46d656859cea34fa48d548ae7295c6d034daeecbf7160e18ab9
-
SHA512
915cddf29f6f5daef22433498ab85856db36e25540ae9cbbde9a25a616781f2ccb262f64c9475cbd46629aba76b9c84e8344c36e546f13c9d31ccde3a131e906
-
SSDEEP
384:UBWoC5GDr6wc/w3HgM6vDUTAXBGCVf4WVlFvXfR4nsHCaJ97Oi:rRkiLw3HsDSARGG/Nim7
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops file in Drivers directory
-
Event Triggered Execution: Image File Execution Options Injection
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies WinLogon
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Winlogon Helper DLL
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Winlogon Helper DLL
1Event Triggered Execution
1Image File Execution Options Injection
1