General

  • Target

    jre-5.exe

  • Size

    14.5MB

  • Sample

    241119-pf1fzsvrgw

  • MD5

    fc9eb32d116988b6ffae83a6388da5f4

  • SHA1

    81093ab3a5bd465e95d205457f093745efdbf87c

  • SHA256

    e589884dddfd5c543579b6f557c9c087a56ea252d2fe327cff6f2b1db4570a97

  • SHA512

    f396331be2444561d43d6740781a937e97ddab4fac1ce442954c03e4d83d14b06abe899eb8b802cb74f40e316581368dde2bf579e2f9d87c4188033c56cca8c6

  • SSDEEP

    393216:6B7P2lZeYXCHCV2mbrD4/Frd+e090fFNo:87+WYJsQDYUe0yfFNo

Malware Config

Targets

    • Target

      Device/HarddiskVolume4/SB Laptop/SUKUMARANS BACKUP/D Drive/Sukumaran/D drive/data backup- 28-07-07/Desktop/jre-5.exe

    • Size

      14.5MB

    • MD5

      a2bec18a54863f9797dfabab1ef15196

    • SHA1

      09737ab5e31bf5adc8d0b3a64dfb6ff5d42187ee

    • SHA256

      faf3bfcc34a4ba9ee361f00e17391f7011076cf4991d43da985b7d042a59a0b4

    • SHA512

      f1180da6fc83327ed4eb9fd5c55f78950d026a42712c5a9f1c3355d2c5c27b36f666100dcbab9ebcce62f65acd8a924bd4294ef0d9b2c5f247195aa25b70b4ea

    • SSDEEP

      393216:UML5gI49HBvqRiMz+bRH1yAfQtZgTaz8E7vRdN8Rvcok:UML5D49HGz+bLG6kb/ok

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks