General

  • Target

    Trojan.zip

  • Size

    34.8MB

  • Sample

    241206-mmfztasrez

  • MD5

    bab38d1cdbf56464fc4fec495bae112a

  • SHA1

    551f0bea4ed32eeaf4e468c72435d847647b5010

  • SHA256

    a33b596a570e3ec4cf29dddb37e72adf57499e294c9c873c76429d18b1bc4427

  • SHA512

    05fa5518f1bd0e6f94401df715969a5720a86dff76d3fc7e1763d512ff1978759baf977c4e81703c3d80192f74f5f537d5d29d918f4ed558de5b16841fc06ef8

  • SSDEEP

    786432:HEtAHLbN8/liJBf07nED1doAsM9iUtDLBUkTgt5OGSXXjmeWt3kLli/N:ktXsunERdoq9iquuSRkhiV

Malware Config

Targets

    • Target

      Trojan.zip

    • Size

      34.8MB

    • MD5

      bab38d1cdbf56464fc4fec495bae112a

    • SHA1

      551f0bea4ed32eeaf4e468c72435d847647b5010

    • SHA256

      a33b596a570e3ec4cf29dddb37e72adf57499e294c9c873c76429d18b1bc4427

    • SHA512

      05fa5518f1bd0e6f94401df715969a5720a86dff76d3fc7e1763d512ff1978759baf977c4e81703c3d80192f74f5f537d5d29d918f4ed558de5b16841fc06ef8

    • SSDEEP

      786432:HEtAHLbN8/liJBf07nED1doAsM9iUtDLBUkTgt5OGSXXjmeWt3kLli/N:ktXsunERdoq9iquuSRkhiV

    • UAC bypass

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables cmd.exe use via registry modification

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Possible privilege escalation attempt

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Impair Defenses: Safe Mode Boot

    • Modifies file permissions

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks