General

  • Target

    X.exe

  • Size

    102KB

  • Sample

    241127-h5cynazngj

  • MD5

    c9e523ca6662a0cd384d139e92b77c9c

  • SHA1

    f005e29f97f3c401cc7283d6ae315728a3be9583

  • SHA256

    dc714e9375a1d7d28b3ab1869fa24b059e8b4277e15e73b35635131f7dea7643

  • SHA512

    3de856c025aa15155bad5407146e85d01e322ab0de8de17c98e4ccf5744e235296bb5bee6c0fec54d2333ba7f2a80f424f57f1259b8899ecf4ddd5aa41d3aa90

  • SSDEEP

    1536:2BsPHJyUmkrmihnmAZjaaWDUVnAExfCeTPOW0imYFU47o9Tuui:JfMUm4XQCCD0tPOVvYFx7oZo

Malware Config

Targets

    • Target

      X.exe

    • Size

      102KB

    • MD5

      c9e523ca6662a0cd384d139e92b77c9c

    • SHA1

      f005e29f97f3c401cc7283d6ae315728a3be9583

    • SHA256

      dc714e9375a1d7d28b3ab1869fa24b059e8b4277e15e73b35635131f7dea7643

    • SHA512

      3de856c025aa15155bad5407146e85d01e322ab0de8de17c98e4ccf5744e235296bb5bee6c0fec54d2333ba7f2a80f424f57f1259b8899ecf4ddd5aa41d3aa90

    • SSDEEP

      1536:2BsPHJyUmkrmihnmAZjaaWDUVnAExfCeTPOW0imYFU47o9Tuui:JfMUm4XQCCD0tPOVvYFx7oZo

    • Possible privilege escalation attempt

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Modifies file permissions

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks