General
-
Target
backgroundTaskHost.exe
-
Size
49KB
-
Sample
241207-dt4j1syrbn
-
MD5
8bde0ae40012bd639fc60e494cc32356
-
SHA1
422ae532bc5ee74b13ee0be406a62c706b81f7ec
-
SHA256
b7d2c17e0038945aa4b72ae7a89e54d29b04ccc0feb62df5c9b7b67de43c2530
-
SHA512
64dc6fafbe6ed242304d2df1c8c1581101bdea97290d7aaa26d5a465eb9145f8e31617f4e55d5487af43d9ebce8f4e39a997b37af808983f6a4ba75c05dd8a0d
-
SSDEEP
384:10ZoYK6BABHcYLWKGWydDBRJeHR9z37zk:1VBHRZad1Pc9zr4
Static task
static1
Malware Config
Targets
-
-
Target
backgroundTaskHost.exe
-
Size
49KB
-
MD5
8bde0ae40012bd639fc60e494cc32356
-
SHA1
422ae532bc5ee74b13ee0be406a62c706b81f7ec
-
SHA256
b7d2c17e0038945aa4b72ae7a89e54d29b04ccc0feb62df5c9b7b67de43c2530
-
SHA512
64dc6fafbe6ed242304d2df1c8c1581101bdea97290d7aaa26d5a465eb9145f8e31617f4e55d5487af43d9ebce8f4e39a997b37af808983f6a4ba75c05dd8a0d
-
SSDEEP
384:10ZoYK6BABHcYLWKGWydDBRJeHR9z37zk:1VBHRZad1Pc9zr4
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1