General
-
Target
F-15CASE.py
-
Size
17KB
-
Sample
241204-wk44asyrfp
-
MD5
1580f49e48a5b344f32510c474f8046d
-
SHA1
a1a0d74245597b056f154c1f66f86a2dac1fed34
-
SHA256
82154f748a22bb1941b31a591af1ec6d73d694b410b6e337a2f72d6fbb4b4ea2
-
SHA512
6d620e6159af85760d351790829cd5c28af10c7fcdba9028c9386256bd2de0bec943bd77467f8619eec9a3095666e71600b0ef37f1210eed62535d82d89de6a2
-
SSDEEP
384:Evl2Xaka4tEEq4WjAHPRSgeCtHnonzPKq9IEBfrer+vW:EvAonDvBfra
Static task
static1
Malware Config
Targets
-
-
Target
F-15CASE.py
-
Size
17KB
-
MD5
1580f49e48a5b344f32510c474f8046d
-
SHA1
a1a0d74245597b056f154c1f66f86a2dac1fed34
-
SHA256
82154f748a22bb1941b31a591af1ec6d73d694b410b6e337a2f72d6fbb4b4ea2
-
SHA512
6d620e6159af85760d351790829cd5c28af10c7fcdba9028c9386256bd2de0bec943bd77467f8619eec9a3095666e71600b0ef37f1210eed62535d82d89de6a2
-
SSDEEP
384:Evl2Xaka4tEEq4WjAHPRSgeCtHnonzPKq9IEBfrer+vW:EvAonDvBfra
-
Downloads MZ/PE file
-
A potential corporate email address has been identified in the URL: =@L
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1