Resubmissions

13-11-2024 19:20

241113-x15v7sxlas 6

General

  • Target

    BraveBrowserSetup-BRV002.exe

  • Size

    1.2MB

  • Sample

    241113-x15v7sxlas

  • MD5

    fa8f8c658a94002db25f6a922d3c686a

  • SHA1

    957eec09abf2825485e043ec2d5b243ff03f78db

  • SHA256

    a88a51f4eb871cfc88eb51969a6ff335cf0ac5e255ad21f4ca4b09ea144c2838

  • SHA512

    0864979e53ea83b4006cf3a0eb39d8f0b3771b6a6592852dd43ac54979aaa9a5f35f305c1404e6034349e816a1f9a9aef5b5c4c2482be343358e04b1eddb5ea3

  • SSDEEP

    24576:cmmr/0dkX3LUGAJpah3RhP94EB7Rifz32vIkqGrHPARb0as2SDo:cr/h3LYJwRL4EB7S2Zdas2io

Malware Config

Targets

    • Target

      BraveBrowserSetup-BRV002.exe

    • Size

      1.2MB

    • MD5

      fa8f8c658a94002db25f6a922d3c686a

    • SHA1

      957eec09abf2825485e043ec2d5b243ff03f78db

    • SHA256

      a88a51f4eb871cfc88eb51969a6ff335cf0ac5e255ad21f4ca4b09ea144c2838

    • SHA512

      0864979e53ea83b4006cf3a0eb39d8f0b3771b6a6592852dd43ac54979aaa9a5f35f305c1404e6034349e816a1f9a9aef5b5c4c2482be343358e04b1eddb5ea3

    • SSDEEP

      24576:cmmr/0dkX3LUGAJpah3RhP94EB7Rifz32vIkqGrHPARb0as2SDo:cr/h3LYJwRL4EB7S2Zdas2io

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Event Triggered Execution: Image File Execution Options Injection

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks