General

  • Target

    2024-11-12_df4fcbb3561da1d9f33b03ce7ed4335b_goldeneye

  • Size

    216KB

  • Sample

    241112-rwc2qsvcnn

  • MD5

    df4fcbb3561da1d9f33b03ce7ed4335b

  • SHA1

    e3c82affe6763eeffd34f184b8f1c550b605deb4

  • SHA256

    6788ca769dcc7c0a9d369ec9615b1d8cfef256aec0704979ebe0b216938d9372

  • SHA512

    bcd7500d47c2790041eddfa3cbd8bbf16bb4979d808891a5b79c1402ff39f06234e29457817c7015224b457b2b5c911f870f3f3fb48aa3a3a8026346a2b9b15b

  • SSDEEP

    3072:jEGh0oLl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMUy:jEGNlEeKcAEcGy

Malware Config

Targets

    • Target

      2024-11-12_df4fcbb3561da1d9f33b03ce7ed4335b_goldeneye

    • Size

      216KB

    • MD5

      df4fcbb3561da1d9f33b03ce7ed4335b

    • SHA1

      e3c82affe6763eeffd34f184b8f1c550b605deb4

    • SHA256

      6788ca769dcc7c0a9d369ec9615b1d8cfef256aec0704979ebe0b216938d9372

    • SHA512

      bcd7500d47c2790041eddfa3cbd8bbf16bb4979d808891a5b79c1402ff39f06234e29457817c7015224b457b2b5c911f870f3f3fb48aa3a3a8026346a2b9b15b

    • SSDEEP

      3072:jEGh0oLl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMUy:jEGNlEeKcAEcGy

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Deletes itself

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks