General

  • Target

    723553540a5bdd7ae07408bceef12e9b4feb1b572a5c0d30c251fe2bdf4bc5bf

  • Size

    5.4MB

  • Sample

    241113-j4vmraxmev

  • MD5

    51f8a6e0438ee3b616c5768326a30ede

  • SHA1

    4f46a0f80fd001cff87f747ce43551aae8da15c4

  • SHA256

    723553540a5bdd7ae07408bceef12e9b4feb1b572a5c0d30c251fe2bdf4bc5bf

  • SHA512

    8a97063816d8312bac5834129b8c37f106be3c9bf64bbd4994f9fa2ec360d9ee84fc0555de04a96dce23f17171fe74c40185e8a1526a42709d97c654402a57fc

  • SSDEEP

    98304:Z4s6efPOEnXkHywo+EVhaecMUzG4uc96ob2:afefPFZs6Uruc9Xb

Malware Config

Targets

    • Target

      723553540a5bdd7ae07408bceef12e9b4feb1b572a5c0d30c251fe2bdf4bc5bf

    • Size

      5.4MB

    • MD5

      51f8a6e0438ee3b616c5768326a30ede

    • SHA1

      4f46a0f80fd001cff87f747ce43551aae8da15c4

    • SHA256

      723553540a5bdd7ae07408bceef12e9b4feb1b572a5c0d30c251fe2bdf4bc5bf

    • SHA512

      8a97063816d8312bac5834129b8c37f106be3c9bf64bbd4994f9fa2ec360d9ee84fc0555de04a96dce23f17171fe74c40185e8a1526a42709d97c654402a57fc

    • SSDEEP

      98304:Z4s6efPOEnXkHywo+EVhaecMUzG4uc96ob2:afefPFZs6Uruc9Xb

    • Sets service image path in registry

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Boot or Logon Autostart Execution: Authentication Package

      Suspicious Windows Authentication Registry Modification.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks