General

  • Target

    c2c5837094cd8de442e49235887ce10e31e9f7ccc39af67235cfd548e7a1a177.lnk

  • Size

    2KB

  • Sample

    241127-dhhheazqer

  • MD5

    4a658619a07a5237c0e85b75bf14e644

  • SHA1

    089a04cc3a66c5b86ddbb6a481c5ab8702c1e621

  • SHA256

    c2c5837094cd8de442e49235887ce10e31e9f7ccc39af67235cfd548e7a1a177

  • SHA512

    88e0b970b2da52b263ecd6008a58df1094ce1acac03bd1358afad0d99daa6c3f89c32122451a3f6632f42db70541b3982ecaff046eda569968ed6ffd2879a394

Malware Config

Targets

    • Target

      c2c5837094cd8de442e49235887ce10e31e9f7ccc39af67235cfd548e7a1a177.lnk

    • Size

      2KB

    • MD5

      4a658619a07a5237c0e85b75bf14e644

    • SHA1

      089a04cc3a66c5b86ddbb6a481c5ab8702c1e621

    • SHA256

      c2c5837094cd8de442e49235887ce10e31e9f7ccc39af67235cfd548e7a1a177

    • SHA512

      88e0b970b2da52b263ecd6008a58df1094ce1acac03bd1358afad0d99daa6c3f89c32122451a3f6632f42db70541b3982ecaff046eda569968ed6ffd2879a394

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Remote Service Session Hijacking: RDP Hijacking

      Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Indicator Removal: Network Share Connection Removal

      Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Drops file in System32 directory

    • Hide Artifacts: Hidden Users

MITRE ATT&CK Enterprise v15

Tasks