General
-
Target
DONOTOPENINWEB.txt
-
Size
449B
-
Sample
241201-y2hmqs1jbx
-
MD5
b905963e0bb2d2d4f9a0b6a88bb5d04c
-
SHA1
182a1ab984d6a7c0359135de45765b41b7c542a3
-
SHA256
93537a3e7b05f9a7873be00d310c278969de796cfd3693c5e4677898bc638021
-
SHA512
ef0343f83e33cecb95bd5f1d91210e916aa43fa7897175d5b40e0e2722ad50adef28f9dcd58e33961fbea94be8ec886e4a09d1ba167ca41be73d50c30ee2d5bc
Static task
static1
Behavioral task
behavioral1
Sample
DONOTOPENINWEB.txt
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
DONOTOPENINWEB.txt
-
Size
449B
-
MD5
b905963e0bb2d2d4f9a0b6a88bb5d04c
-
SHA1
182a1ab984d6a7c0359135de45765b41b7c542a3
-
SHA256
93537a3e7b05f9a7873be00d310c278969de796cfd3693c5e4677898bc638021
-
SHA512
ef0343f83e33cecb95bd5f1d91210e916aa43fa7897175d5b40e0e2722ad50adef28f9dcd58e33961fbea94be8ec886e4a09d1ba167ca41be73d50c30ee2d5bc
-
Downloads MZ/PE file
-
A potential corporate email address has been identified in the URL: [email protected]
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Component Object Model Hijacking
1Pre-OS Boot
1Bootkit
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1