General

  • Target

    Virus.exe

  • Size

    6.7MB

  • Sample

    241209-szmk1sxldj

  • MD5

    7934cac1097c699a3d4b2e683eb53014

  • SHA1

    8f0709fd999200f1bfdd3d35f4a7adab3911e1e1

  • SHA256

    3690bc42c1c05331b2ea1374f99230cfe82d71bb72098d679575df6cdf6ad308

  • SHA512

    41dfd120ddc50b95daaea7b663b6dc088083916f158f438807681e991e170399da47591e43a4b5c5d76c5238a605ac3244e36a0d064582fc0b8eca8a73638d55

  • SSDEEP

    196608:FCXlY8XMCHGLLc54i1wN+lPIcu9KYK39sI3PPJNMRRccx:kXdXMCHWUjqcuI3/PJNe

Malware Config

Targets

    • Target

      Virus.exe

    • Size

      6.7MB

    • MD5

      7934cac1097c699a3d4b2e683eb53014

    • SHA1

      8f0709fd999200f1bfdd3d35f4a7adab3911e1e1

    • SHA256

      3690bc42c1c05331b2ea1374f99230cfe82d71bb72098d679575df6cdf6ad308

    • SHA512

      41dfd120ddc50b95daaea7b663b6dc088083916f158f438807681e991e170399da47591e43a4b5c5d76c5238a605ac3244e36a0d064582fc0b8eca8a73638d55

    • SSDEEP

      196608:FCXlY8XMCHGLLc54i1wN+lPIcu9KYK39sI3PPJNMRRccx:kXdXMCHWUjqcuI3/PJNe

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Loads dropped DLL

    • Drops desktop.ini file(s)

    • Detected potential entity reuse from brand MICROSOFT.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks