General

  • Target

    download.jpeg

  • Size

    8KB

  • Sample

    241209-wte6jawnb1

  • MD5

    481a86abe01f14ad73d0d93e454ed545

  • SHA1

    065757d42e841d3448ea2ed5faae9ee0bf9aed97

  • SHA256

    ffd75540b52e4e5ad5725d58ce5af9d65e4984789aff76d82ad2fc5715df0357

  • SHA512

    b39935b0a026fe5c500c7e575da1922f22cf8a439b22d74ff1a7187b3786c18a7ae5568f9f34af4279560fba5a741a3760613eb903f836d444b246c5d56ed4d5

  • SSDEEP

    192:eWY1Lq5qF7bH2cGfx/XmqUZWJgrKj14Y25DXiX:eWY1FJrufBXvIKR14T5WX

Malware Config

Targets

    • Target

      download.jpeg

    • Size

      8KB

    • MD5

      481a86abe01f14ad73d0d93e454ed545

    • SHA1

      065757d42e841d3448ea2ed5faae9ee0bf9aed97

    • SHA256

      ffd75540b52e4e5ad5725d58ce5af9d65e4984789aff76d82ad2fc5715df0357

    • SHA512

      b39935b0a026fe5c500c7e575da1922f22cf8a439b22d74ff1a7187b3786c18a7ae5568f9f34af4279560fba5a741a3760613eb903f836d444b246c5d56ed4d5

    • SSDEEP

      192:eWY1Lq5qF7bH2cGfx/XmqUZWJgrKj14Y25DXiX:eWY1FJrufBXvIKR14T5WX

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • Mimikatz family

    • Modifies Windows Defender Real-time Protection settings

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • mimikatz is an open source tool to dump credentials on Windows

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables use of System Restore points

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks