General

  • Target

    mainscript.exe

  • Size

    30.5MB

  • Sample

    241120-gbkwqs1hpc

  • MD5

    fe938dddcdde5dead88664b162203f13

  • SHA1

    26a09a6863e3c37eae88238a7af01f52885dc075

  • SHA256

    5a8a920e53d94da984ebcd9ff188c91feb71843442ca64a6af53252f49fbf699

  • SHA512

    d7334b5c787fc0adc497974bfeb23488a64a586fe5bbaae3b68d47398cca5845796cf4eafc3ee1afe7d15095793776c1537f2872565b3385a006097267bced88

  • SSDEEP

    786432:su9Yi8MkQ1JnW828P51QtIbSw1JIxHEha8DZcQl8uBDHDIlDP:B9SA1Wr8PXiI2gNs6OupM

Malware Config

Targets

    • Target

      mainscript.exe

    • Size

      30.5MB

    • MD5

      fe938dddcdde5dead88664b162203f13

    • SHA1

      26a09a6863e3c37eae88238a7af01f52885dc075

    • SHA256

      5a8a920e53d94da984ebcd9ff188c91feb71843442ca64a6af53252f49fbf699

    • SHA512

      d7334b5c787fc0adc497974bfeb23488a64a586fe5bbaae3b68d47398cca5845796cf4eafc3ee1afe7d15095793776c1537f2872565b3385a006097267bced88

    • SSDEEP

      786432:su9Yi8MkQ1JnW828P51QtIbSw1JIxHEha8DZcQl8uBDHDIlDP:B9SA1Wr8PXiI2gNs6OupM

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks