General
-
Target
98icons1.png
-
Size
8KB
-
Sample
241119-trl5yssrcp
-
MD5
e095491c395e62f161d55edd1f0d7d97
-
SHA1
a9a5454993e3f219d611a665c0c3abfd4bc142e8
-
SHA256
de82cc6e49fe5501e27e81701636e7aeaf5f3c252ba467d8a1f1824c235bb3bc
-
SHA512
c7f55c45099f0497781e9ef8f13e56f5b203932ca5a4040017533c00b193f1b08519e3e07b38e2243d843de556d3df4f8a4c276fe86f983fcfc8dec7943d32ca
-
SSDEEP
192:igCaAkM0Kj1TLr+hBYbxnN/y+e0sUFfarZot73i41:ibe61Hr4GnLe01aGjiK
Static task
static1
Behavioral task
behavioral1
Sample
98icons1.png
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
98icons1.png
-
Size
8KB
-
MD5
e095491c395e62f161d55edd1f0d7d97
-
SHA1
a9a5454993e3f219d611a665c0c3abfd4bc142e8
-
SHA256
de82cc6e49fe5501e27e81701636e7aeaf5f3c252ba467d8a1f1824c235bb3bc
-
SHA512
c7f55c45099f0497781e9ef8f13e56f5b203932ca5a4040017533c00b193f1b08519e3e07b38e2243d843de556d3df4f8a4c276fe86f983fcfc8dec7943d32ca
-
SSDEEP
192:igCaAkM0Kj1TLr+hBYbxnN/y+e0sUFfarZot73i41:ibe61Hr4GnLe01aGjiK
-
Modifies RDP port number used by Windows
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Remote Services: SMB/Windows Admin Shares
Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).
-
MITRE ATT&CK Enterprise v15
Discovery
Browser Information Discovery
1Peripheral Device Discovery
2Query Registry
6System Information Discovery
6System Location Discovery
1System Language Discovery
1