General

  • Target

    VTRL.exe

  • Size

    5.5MB

  • Sample

    241120-mxw4sazpfr

  • MD5

    ce30bc18638aa4cc62e39989c24727b6

  • SHA1

    118527d0bd5ff33fc0e6cbdf728b6607dd0d6f68

  • SHA256

    6a57f62fc52d3db1a5a2a3ba4eb4bfaf76ce7b7e589b0f15d924700adade078a

  • SHA512

    8a430eb9a8272e6a311c73f119ffd129993e1171920c987af43804e8c63028f5c69a8efc95618ee7639d0be2dcdd9796cf178fa6e59970443f7477dc051e3df5

  • SSDEEP

    49152:xPKuSAUsUZSjd7qlfr+cyTSxgRKUOt/JrqnDOIEanGBTSFLo+nGbeHme+APyTcne:JKjITTSREzAso+aYyOw8HZ04X8

Malware Config

Targets

    • Target

      VTRL.exe

    • Size

      5.5MB

    • MD5

      ce30bc18638aa4cc62e39989c24727b6

    • SHA1

      118527d0bd5ff33fc0e6cbdf728b6607dd0d6f68

    • SHA256

      6a57f62fc52d3db1a5a2a3ba4eb4bfaf76ce7b7e589b0f15d924700adade078a

    • SHA512

      8a430eb9a8272e6a311c73f119ffd129993e1171920c987af43804e8c63028f5c69a8efc95618ee7639d0be2dcdd9796cf178fa6e59970443f7477dc051e3df5

    • SSDEEP

      49152:xPKuSAUsUZSjd7qlfr+cyTSxgRKUOt/JrqnDOIEanGBTSFLo+nGbeHme+APyTcne:JKjITTSREzAso+aYyOw8HZ04X8

    • Clears Windows event logs

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Possible privilege escalation attempt

    • A potential corporate email address has been identified in the URL: [email protected]

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Detected potential entity reuse from brand MICROSOFT.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks