General
-
Target
RTX SCRIPT!!.txt
-
Size
2KB
-
Sample
241103-mc5kes1gqe
-
MD5
9d69ba53e68c458b2e7041c29107f728
-
SHA1
d93ce9dcaf2ed68d6b75c545d7e7cc0358ae36be
-
SHA256
0b9190b8e62814ba3c6b46b175f4a6f30c81d5b8cf1bf24b36170ebf6bb65dd5
-
SHA512
326acc8050a5cb3f558924ffaa1f24960523ace5c70542f45d1ff374e668216557b90de10bbecb1d8367ef7c96e12ffd1e6c9da8614184cc2241f6cb5b62b19b
Static task
static1
Malware Config
Targets
-
-
Target
RTX SCRIPT!!.txt
-
Size
2KB
-
MD5
9d69ba53e68c458b2e7041c29107f728
-
SHA1
d93ce9dcaf2ed68d6b75c545d7e7cc0358ae36be
-
SHA256
0b9190b8e62814ba3c6b46b175f4a6f30c81d5b8cf1bf24b36170ebf6bb65dd5
-
SHA512
326acc8050a5cb3f558924ffaa1f24960523ace5c70542f45d1ff374e668216557b90de10bbecb1d8367ef7c96e12ffd1e6c9da8614184cc2241f6cb5b62b19b
-
Contacts a large (775) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks for any installed AV software in registry
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Peripheral Device Discovery
1Query Registry
5Software Discovery
1Security Software Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1