General

  • Target

    Sryxen-main.zip

  • Size

    1.1MB

  • Sample

    241204-ww55qsvjew

  • MD5

    235c8379ad047cc7f1dae05470e235a8

  • SHA1

    c9a328a779395449bb6a58c01322892b63d506c3

  • SHA256

    4005a08a4853f72ebd58f49ea28e39b0ecf239eb9ada1aaa2c3adcfec8a48238

  • SHA512

    23e5dd80f76812502f91d57ab1f303da41d43367d5e05777e43e6692fd3ffde3668f740347baceb4976a440ab659c518d5bc9694e5efd77ba1fee4b666d97849

  • SSDEEP

    24576:IjvbwBoSoz39x2UTLmpLtWv6SKZQrE/j1aMoLs:I/wBEzNo+LmttWvtQBYs

Malware Config

Targets

    • Target

      Sryxen-main.zip

    • Size

      1.1MB

    • MD5

      235c8379ad047cc7f1dae05470e235a8

    • SHA1

      c9a328a779395449bb6a58c01322892b63d506c3

    • SHA256

      4005a08a4853f72ebd58f49ea28e39b0ecf239eb9ada1aaa2c3adcfec8a48238

    • SHA512

      23e5dd80f76812502f91d57ab1f303da41d43367d5e05777e43e6692fd3ffde3668f740347baceb4976a440ab659c518d5bc9694e5efd77ba1fee4b666d97849

    • SSDEEP

      24576:IjvbwBoSoz39x2UTLmpLtWv6SKZQrE/j1aMoLs:I/wBEzNo+LmttWvtQBYs

    • Downloads MZ/PE file

    • A potential corporate email address has been identified in the URL: [email protected]

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

    • Probable phishing domain

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks