General
-
Target
DONOTOPENINWEB.txt
-
Size
449B
-
Sample
241201-ygcwrazlhy
-
MD5
b905963e0bb2d2d4f9a0b6a88bb5d04c
-
SHA1
182a1ab984d6a7c0359135de45765b41b7c542a3
-
SHA256
93537a3e7b05f9a7873be00d310c278969de796cfd3693c5e4677898bc638021
-
SHA512
ef0343f83e33cecb95bd5f1d91210e916aa43fa7897175d5b40e0e2722ad50adef28f9dcd58e33961fbea94be8ec886e4a09d1ba167ca41be73d50c30ee2d5bc
Static task
static1
Malware Config
Targets
-
-
Target
DONOTOPENINWEB.txt
-
Size
449B
-
MD5
b905963e0bb2d2d4f9a0b6a88bb5d04c
-
SHA1
182a1ab984d6a7c0359135de45765b41b7c542a3
-
SHA256
93537a3e7b05f9a7873be00d310c278969de796cfd3693c5e4677898bc638021
-
SHA512
ef0343f83e33cecb95bd5f1d91210e916aa43fa7897175d5b40e0e2722ad50adef28f9dcd58e33961fbea94be8ec886e4a09d1ba167ca41be73d50c30ee2d5bc
-
Downloads MZ/PE file
-
Uses Session Manager for persistence
Creates Session Manager registry key to run executable early in system boot.
-
A potential corporate email address has been identified in the URL: 67C716D751E567F70A490D4C@AdobeOrg
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks for any installed AV software in registry
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1