Resubmissions

20/11/2024, 05:52

241120-gkqtcaslgt 8

20/11/2024, 05:48

241120-ghq2bsslcy 8

General

  • Target

    multitool.bat

  • Size

    13KB

  • Sample

    241120-gkqtcaslgt

  • MD5

    13c993e12d2c1bd4a22989b4cec3ca08

  • SHA1

    53e8c405609cc494c2279601e1c633bfaea2d3f6

  • SHA256

    32d552b5a77e373d5a8e1ff3e0597ce8e92e806ac5539c523b438ca1d6402ce8

  • SHA512

    25ddbda533ccb6de9cb7e2f9c078c405456d2e21bedcf8a07644c7b468ebef6c636c748ea6335b9538452f3ee19a1ed4e51b5c6f8be0e6213732ca90677512e4

  • SSDEEP

    192:5BiPj9JJI4b96R48PL01llumLif9bM80QVMZ5Ouj9JJm0nmagp85w/Cvx6fffvh5:5Sb9wg+x+ZZBNOgCB

Malware Config

Targets

    • Target

      multitool.bat

    • Size

      13KB

    • MD5

      13c993e12d2c1bd4a22989b4cec3ca08

    • SHA1

      53e8c405609cc494c2279601e1c633bfaea2d3f6

    • SHA256

      32d552b5a77e373d5a8e1ff3e0597ce8e92e806ac5539c523b438ca1d6402ce8

    • SHA512

      25ddbda533ccb6de9cb7e2f9c078c405456d2e21bedcf8a07644c7b468ebef6c636c748ea6335b9538452f3ee19a1ed4e51b5c6f8be0e6213732ca90677512e4

    • SSDEEP

      192:5BiPj9JJI4b96R48PL01llumLif9bM80QVMZ5Ouj9JJm0nmagp85w/Cvx6fffvh5:5Sb9wg+x+ZZBNOgCB

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks