Resubmissions
12-12-2024 19:55
241212-ym8klsxnfp 1012-12-2024 19:20
241212-x12tjsvkgv 1012-12-2024 19:16
241212-xy8jbavkaz 1012-12-2024 19:16
241212-xy39lavkat 1012-12-2024 18:49
241212-xgrjgavqap 1012-12-2024 18:46
241212-xe5nbatjet 1012-12-2024 18:39
241212-xa1tkavncm 1012-12-2024 18:27
241212-w3sg8aspa1 10General
-
Target
mta.exe
-
Size
98KB
-
Sample
241212-x12tjsvkgv
-
MD5
778dce14368e8b1105544c43ce09d2f1
-
SHA1
81c7cc17d48b8c5e6e5b9cc1efc8bbae1646dcb0
-
SHA256
1d184c635a032625f10639ec3458a6f8d0a36a6a82078a11b820924f39056080
-
SHA512
31a517a024726bef90c60c05173852de117e27960e981ec92456e6a3e4c0b6ac50437b8bfd2ced7afbad2a81c3e00a4c9bd5622af2236f3ae37856d6fd9d4aab
-
SSDEEP
1536:Vic45PApy/vpjAnT9ZqzY4r5VVZDAcE3VCQfwbJ6Pr5+NzxCxoKV6+UyNV:AxApgR8T9EE4r5n8rwbJ6Pr5+zNyj
Behavioral task
behavioral1
Sample
mta.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
mta.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral3
Sample
mta.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
mta.exe
-
Size
98KB
-
MD5
778dce14368e8b1105544c43ce09d2f1
-
SHA1
81c7cc17d48b8c5e6e5b9cc1efc8bbae1646dcb0
-
SHA256
1d184c635a032625f10639ec3458a6f8d0a36a6a82078a11b820924f39056080
-
SHA512
31a517a024726bef90c60c05173852de117e27960e981ec92456e6a3e4c0b6ac50437b8bfd2ced7afbad2a81c3e00a4c9bd5622af2236f3ae37856d6fd9d4aab
-
SSDEEP
1536:Vic45PApy/vpjAnT9ZqzY4r5VVZDAcE3VCQfwbJ6Pr5+NzxCxoKV6+UyNV:AxApgR8T9EE4r5n8rwbJ6Pr5+zNyj
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Discordrat family
-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
A potential corporate email address has been identified in the URL: [email protected]
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1