General

  • Target

    img100 (8).png

  • Size

    1.4MB

  • Sample

    241110-tk5cyszkey

  • MD5

    f1ad1ff08db4b54537c40d9ea369a4b4

  • SHA1

    e0a87b82a6a080e8fa78d22cd5b8a2fa2d2dd241

  • SHA256

    b98f423ef45672dfd08e36f1ed2279b8a4a7c797a34a3349507bf6e68a95eb8c

  • SHA512

    558e8b18efc83846944180e8eba397784aaa37bef20744277fa521b99ddeaea9c15003dd8cc494d7f3737135f9b7b59c4634ff0d19fc3dae89e0aa17658d61f8

  • SSDEEP

    24576:/12hYitTBAc+64EvTBJg47tO9QU1poyGneUlAGG+pxtvR4WH/DqOtum1IhZ:/1YYitTBAcXh1Jg+tOWupFUlAV0dqOtC

Malware Config

Targets

    • Target

      img100 (8).png

    • Size

      1.4MB

    • MD5

      f1ad1ff08db4b54537c40d9ea369a4b4

    • SHA1

      e0a87b82a6a080e8fa78d22cd5b8a2fa2d2dd241

    • SHA256

      b98f423ef45672dfd08e36f1ed2279b8a4a7c797a34a3349507bf6e68a95eb8c

    • SHA512

      558e8b18efc83846944180e8eba397784aaa37bef20744277fa521b99ddeaea9c15003dd8cc494d7f3737135f9b7b59c4634ff0d19fc3dae89e0aa17658d61f8

    • SSDEEP

      24576:/12hYitTBAc+64EvTBJg47tO9QU1poyGneUlAGG+pxtvR4WH/DqOtum1IhZ:/1YYitTBAcXh1Jg+tOWupFUlAV0dqOtC

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

MITRE ATT&CK Enterprise v15

Tasks