Resubmissions

14-12-2024 09:08

241214-k365tsxlew 10

14-12-2024 09:06

241214-k26gxaxldt 7

14-12-2024 08:50

241214-krn5waymgp 7

General

  • Target

    sample

  • Size

    267KB

  • Sample

    241214-k365tsxlew

  • MD5

    65624ae0f03e4b0b37b193246a35de15

  • SHA1

    b91e192d5b0199ddf70bec6dbc5e6237791c80de

  • SHA256

    14c9466ae2013053d20cf15258c8fcdf886e752542c7a0519fd39537d91c537b

  • SHA512

    e3ab55d6104b4ba7c70f67e66e8663e461c6317df593d9478994abeb2292e5edef1bf1782d1535bf486a6618f6ff35ad05d6ddedd34570a0fa44d0d976c7a8f2

  • SSDEEP

    3072:7Oh7Oi+0joZWm0ITADlNRzh4bgEJfzrIugDAwtN+Tl/jS4:7Oh7A0joZQITeRIgEJHIbCS4

Malware Config

Targets

    • Target

      sample

    • Size

      267KB

    • MD5

      65624ae0f03e4b0b37b193246a35de15

    • SHA1

      b91e192d5b0199ddf70bec6dbc5e6237791c80de

    • SHA256

      14c9466ae2013053d20cf15258c8fcdf886e752542c7a0519fd39537d91c537b

    • SHA512

      e3ab55d6104b4ba7c70f67e66e8663e461c6317df593d9478994abeb2292e5edef1bf1782d1535bf486a6618f6ff35ad05d6ddedd34570a0fa44d0d976c7a8f2

    • SSDEEP

      3072:7Oh7Oi+0joZWm0ITADlNRzh4bgEJfzrIugDAwtN+Tl/jS4:7Oh7A0joZQITeRIgEJHIbCS4

    • Modifies firewall policy service

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • A potential corporate email address has been identified in the URL: PUID0003BFFE8D71713A@84df9e7fe9f640afb435aaaaaaaaaaaa

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Boot or Logon Autostart Execution: Authentication Package

      Suspicious Windows Authentication Registry Modification.

    • Detected potential entity reuse from brand MICROSOFT.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks