Resubmissions

23-11-2024 19:08

241123-xtgvssxphk 8

22-11-2024 10:09

241122-l6tvcavlak 10

General

  • Target

    Tumeg.bat

  • Size

    43KB

  • Sample

    241122-l6tvcavlak

  • MD5

    6fd336e404c820cea27c1ab6f627189c

  • SHA1

    f3762bd54aabdf45b086ff6da85aa4fa04a183be

  • SHA256

    2e5731639e0f5eed877b8a6efc4f765e0afcf1065f5046f963abcc9df818a163

  • SHA512

    fe3c7a22f99ff66aea81c8a74c0ebfb3b2f49baa3757b83fd6d243eb1b9838dce42e82627392b5b3567846d01420b0b70da0ad2e1e1dad952f52b0ac79c249cd

  • SSDEEP

    768:58RhJLWEE08AxPzjc5O9tKVA2BCielbMq6ii5qHxAx7K5OpKVA4BHnKbK63Vgjg:589jg

Malware Config

Targets

    • Target

      Tumeg.bat

    • Size

      43KB

    • MD5

      6fd336e404c820cea27c1ab6f627189c

    • SHA1

      f3762bd54aabdf45b086ff6da85aa4fa04a183be

    • SHA256

      2e5731639e0f5eed877b8a6efc4f765e0afcf1065f5046f963abcc9df818a163

    • SHA512

      fe3c7a22f99ff66aea81c8a74c0ebfb3b2f49baa3757b83fd6d243eb1b9838dce42e82627392b5b3567846d01420b0b70da0ad2e1e1dad952f52b0ac79c249cd

    • SSDEEP

      768:58RhJLWEE08AxPzjc5O9tKVA2BCielbMq6ii5qHxAx7K5OpKVA4BHnKbK63Vgjg:589jg

    • Windows security bypass

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Modifies file permissions

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks