General

  • Target

    98icons1.png

  • Size

    8KB

  • Sample

    241119-trl5yssrcp

  • MD5

    e095491c395e62f161d55edd1f0d7d97

  • SHA1

    a9a5454993e3f219d611a665c0c3abfd4bc142e8

  • SHA256

    de82cc6e49fe5501e27e81701636e7aeaf5f3c252ba467d8a1f1824c235bb3bc

  • SHA512

    c7f55c45099f0497781e9ef8f13e56f5b203932ca5a4040017533c00b193f1b08519e3e07b38e2243d843de556d3df4f8a4c276fe86f983fcfc8dec7943d32ca

  • SSDEEP

    192:igCaAkM0Kj1TLr+hBYbxnN/y+e0sUFfarZot73i41:ibe61Hr4GnLe01aGjiK

Malware Config

Targets

    • Target

      98icons1.png

    • Size

      8KB

    • MD5

      e095491c395e62f161d55edd1f0d7d97

    • SHA1

      a9a5454993e3f219d611a665c0c3abfd4bc142e8

    • SHA256

      de82cc6e49fe5501e27e81701636e7aeaf5f3c252ba467d8a1f1824c235bb3bc

    • SHA512

      c7f55c45099f0497781e9ef8f13e56f5b203932ca5a4040017533c00b193f1b08519e3e07b38e2243d843de556d3df4f8a4c276fe86f983fcfc8dec7943d32ca

    • SSDEEP

      192:igCaAkM0Kj1TLr+hBYbxnN/y+e0sUFfarZot73i41:ibe61Hr4GnLe01aGjiK

    • Modifies RDP port number used by Windows

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Remote Services: SMB/Windows Admin Shares

      Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).

MITRE ATT&CK Enterprise v15

Tasks