General

  • Target

    MagicDork Premium v3.4.5.exe

  • Size

    8KB

  • Sample

    241204-qb76pswmcz

  • MD5

    bc4bc3abc2a6c7008ba586394e653f6a

  • SHA1

    a213a27ad4d756506e7a8b581ee6686031c70610

  • SHA256

    90df211fe009f950d2f0a903bf2a2e609788b2d9d5183a28aab02c528ee8d505

  • SHA512

    e52a45671658725444e3b6cb72547f942b831274980f239f8e6a7899dd9506538ccd3616532f1492a94c1f47a2c09fd9f88480f615da61039fa604223f280b8d

  • SSDEEP

    96:yp+bNXPhviNjOi4cBmdjS+d579i9bm605/ltk+Vdc0M1ks5OaczNtK:ykZXRikFdm+f96bmzZNdfMOs1m

Malware Config

Targets

    • Target

      MagicDork Premium v3.4.5.exe

    • Size

      8KB

    • MD5

      bc4bc3abc2a6c7008ba586394e653f6a

    • SHA1

      a213a27ad4d756506e7a8b581ee6686031c70610

    • SHA256

      90df211fe009f950d2f0a903bf2a2e609788b2d9d5183a28aab02c528ee8d505

    • SHA512

      e52a45671658725444e3b6cb72547f942b831274980f239f8e6a7899dd9506538ccd3616532f1492a94c1f47a2c09fd9f88480f615da61039fa604223f280b8d

    • SSDEEP

      96:yp+bNXPhviNjOi4cBmdjS+d579i9bm605/ltk+Vdc0M1ks5OaczNtK:ykZXRikFdm+f96bmzZNdfMOs1m

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Remote Service Session Hijacking: RDP Hijacking

      Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

MITRE ATT&CK Enterprise v15

Tasks