General

  • Target

    2024-11-11_a9664f913b60ac3ddebaf133e19dfce2_goldeneye

  • Size

    168KB

  • Sample

    241111-pymmvaylfs

  • MD5

    a9664f913b60ac3ddebaf133e19dfce2

  • SHA1

    2b65f9cc081ba7b6a9117e4939254495e14b401a

  • SHA256

    0a7fd7d4db8d19b08a916c56f7755c038326b81a36bd3d57c4820eab7290152e

  • SHA512

    4081e3c276be84105956093dbab6b3818975a2b797de2c0cfe75f3094b8f42fa2b28af3b6b77618b133506461fbea43cfe5dc4b0bded401715986114f1ecfdc6

  • SSDEEP

    1536:1EGh0oslq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oslqOPOe2MUVg3Ve+rX

Malware Config

Targets

    • Target

      2024-11-11_a9664f913b60ac3ddebaf133e19dfce2_goldeneye

    • Size

      168KB

    • MD5

      a9664f913b60ac3ddebaf133e19dfce2

    • SHA1

      2b65f9cc081ba7b6a9117e4939254495e14b401a

    • SHA256

      0a7fd7d4db8d19b08a916c56f7755c038326b81a36bd3d57c4820eab7290152e

    • SHA512

      4081e3c276be84105956093dbab6b3818975a2b797de2c0cfe75f3094b8f42fa2b28af3b6b77618b133506461fbea43cfe5dc4b0bded401715986114f1ecfdc6

    • SSDEEP

      1536:1EGh0oslq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oslqOPOe2MUVg3Ve+rX

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Deletes itself

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks