General

  • Target

    DR4G0N_FR4ME_4.rar

  • Size

    61.2MB

  • Sample

    241031-yskezavkcl

  • MD5

    af1bc272e2e428223014233bf6bfe4f3

  • SHA1

    feb1c8d60559094683942d1963944a8739459688

  • SHA256

    810fe0c87a71f369609b6a7000a149297d466d33a0558d9272f24afc463ccb83

  • SHA512

    53415fffa5d1f5cdd3e70e876b85d4dc419737b3d6e79c25e80990f7c191b5442c5177be734a37ced1b53fca3610b87d55633116b16f95ec8bc41347751d3618

  • SSDEEP

    1572864:jYMgVp38JSYr49DIUbcXp/bnpiZ4JW8f5mGw6OpRFV:/gz8gYc9DIucXBjEZ4s8fO

Malware Config

Targets

    • Target

      DR4G0N_FR4ME_4.rar

    • Size

      61.2MB

    • MD5

      af1bc272e2e428223014233bf6bfe4f3

    • SHA1

      feb1c8d60559094683942d1963944a8739459688

    • SHA256

      810fe0c87a71f369609b6a7000a149297d466d33a0558d9272f24afc463ccb83

    • SHA512

      53415fffa5d1f5cdd3e70e876b85d4dc419737b3d6e79c25e80990f7c191b5442c5177be734a37ced1b53fca3610b87d55633116b16f95ec8bc41347751d3618

    • SSDEEP

      1572864:jYMgVp38JSYr49DIUbcXp/bnpiZ4JW8f5mGw6OpRFV:/gz8gYc9DIucXBjEZ4s8fO

    • Drops file in Drivers directory

    • Possible privilege escalation attempt

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks