General

  • Target

    TLauncher.exe

  • Size

    9.1MB

  • Sample

    241109-x6j6pa1ald

  • MD5

    d8e44c32ec1df755d88560177779f363

  • SHA1

    445deced30f4be9d5398f3bef7135945e3517f8a

  • SHA256

    979d6884744fa2e4564965efaaceaa448875ee01d90d8392633df96510fb7319

  • SHA512

    b06edddb39c5b70dd424875a902ed50c0a54fef51b5be036bcd639141ff67069c4cccef80c82fce747f84fbc2ee3338b219236a04ec145891e0c8551fc5a047d

  • SSDEEP

    196608:eJhNVPPzMDze1Btp5ahrePa+52Pk6ptJT:eJhN6DzwBv5C

Malware Config

Targets

    • Target

      TLauncher.exe

    • Size

      9.1MB

    • MD5

      d8e44c32ec1df755d88560177779f363

    • SHA1

      445deced30f4be9d5398f3bef7135945e3517f8a

    • SHA256

      979d6884744fa2e4564965efaaceaa448875ee01d90d8392633df96510fb7319

    • SHA512

      b06edddb39c5b70dd424875a902ed50c0a54fef51b5be036bcd639141ff67069c4cccef80c82fce747f84fbc2ee3338b219236a04ec145891e0c8551fc5a047d

    • SSDEEP

      196608:eJhNVPPzMDze1Btp5ahrePa+52Pk6ptJT:eJhN6DzwBv5C

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks