General

  • Target

    2024-11-13_80a45e5b3e01f81685d7f696b20e9f40_goldeneye

  • Size

    180KB

  • Sample

    241113-vjnjgswdlk

  • MD5

    80a45e5b3e01f81685d7f696b20e9f40

  • SHA1

    e143a9fa4e8461fee7480a44ff425ae075d5947e

  • SHA256

    f6cb08b1b962653e519b0c00359779f923105999334b45e5e1eff001cb447a8d

  • SHA512

    27caf53e324cc568ffd74e107bcd7d017db195088904eceb9fd7a3a4bacc89034972a3764ee59360e6ee7d92cdef3a6491c08e47c6e267b6ebb1a67d63323739

  • SSDEEP

    3072:jEGh0omlfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGwl5eKcAEc

Malware Config

Targets

    • Target

      2024-11-13_80a45e5b3e01f81685d7f696b20e9f40_goldeneye

    • Size

      180KB

    • MD5

      80a45e5b3e01f81685d7f696b20e9f40

    • SHA1

      e143a9fa4e8461fee7480a44ff425ae075d5947e

    • SHA256

      f6cb08b1b962653e519b0c00359779f923105999334b45e5e1eff001cb447a8d

    • SHA512

      27caf53e324cc568ffd74e107bcd7d017db195088904eceb9fd7a3a4bacc89034972a3764ee59360e6ee7d92cdef3a6491c08e47c6e267b6ebb1a67d63323739

    • SSDEEP

      3072:jEGh0omlfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGwl5eKcAEc

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Deletes itself

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks