General

  • Target

    mainscript.exe

  • Size

    30.0MB

  • Sample

    241120-f22rha1gkg

  • MD5

    6b7575699b54bda8b2bef855df444985

  • SHA1

    3a790d83624e6f1d6ceeba573b2b7155d159a4dd

  • SHA256

    f5e594adc8e965ca598e75a9793aaddb948f052255b88623823ab10add94ecc7

  • SHA512

    9b5146bbf080641c87547f92f9ebc738b9f7b9781d3eca4ff66463d6011497016b48b71dc6926e5ef9df6058de753039621c2a19de10227bc1faae9cdf248096

  • SSDEEP

    786432:gG9Yi8MkQ1JnW828P51QtIbSw1JIxHEha8DZcQl8NBDQDIOH:D9SA1Wr8PXiI2gNs6ONptO

Malware Config

Targets

    • Target

      mainscript.exe

    • Size

      30.0MB

    • MD5

      6b7575699b54bda8b2bef855df444985

    • SHA1

      3a790d83624e6f1d6ceeba573b2b7155d159a4dd

    • SHA256

      f5e594adc8e965ca598e75a9793aaddb948f052255b88623823ab10add94ecc7

    • SHA512

      9b5146bbf080641c87547f92f9ebc738b9f7b9781d3eca4ff66463d6011497016b48b71dc6926e5ef9df6058de753039621c2a19de10227bc1faae9cdf248096

    • SSDEEP

      786432:gG9Yi8MkQ1JnW828P51QtIbSw1JIxHEha8DZcQl8NBDQDIOH:D9SA1Wr8PXiI2gNs6ONptO

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks