General

  • Target

    67728acae680cdea3a816a247677286bef1a6e654825774cb2774dbec0cb8d27

  • Size

    783KB

  • Sample

    241121-xslscsvnc1

  • MD5

    ae4c5ec9d33b2d6aa3fbb5236b621b34

  • SHA1

    b2002af14ee4f032a9dcf8babe6cc6fe3a82a692

  • SHA256

    67728acae680cdea3a816a247677286bef1a6e654825774cb2774dbec0cb8d27

  • SHA512

    0d31f8e81e1bd220727f0ed08d961790e239ea7208b9d59cb797f79e4c01b9f7cbb664c667453485c10e00f61eaa1bd4171166275d0230fa2aa668fa57043032

  • SSDEEP

    24576:C7M1iJHJT1DGh9idqu8HoHUp+JUsLauA:C7FTQIhGoSsLaZ

Malware Config

Targets

    • Target

      67728acae680cdea3a816a247677286bef1a6e654825774cb2774dbec0cb8d27

    • Size

      783KB

    • MD5

      ae4c5ec9d33b2d6aa3fbb5236b621b34

    • SHA1

      b2002af14ee4f032a9dcf8babe6cc6fe3a82a692

    • SHA256

      67728acae680cdea3a816a247677286bef1a6e654825774cb2774dbec0cb8d27

    • SHA512

      0d31f8e81e1bd220727f0ed08d961790e239ea7208b9d59cb797f79e4c01b9f7cbb664c667453485c10e00f61eaa1bd4171166275d0230fa2aa668fa57043032

    • SSDEEP

      24576:C7M1iJHJT1DGh9idqu8HoHUp+JUsLauA:C7FTQIhGoSsLaZ

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks