General

  • Target

    Loader.rar

  • Size

    2.0MB

  • Sample

    241216-lalh4atphx

  • MD5

    8671554bf9863c593f84d79c447a20dd

  • SHA1

    cd7a78b0bed0ca1759eb670f70afe3b1106ef321

  • SHA256

    09d6c526462cbfa46905ab552067853e3ef34ff6e2db05de3d9c3e7b2a42decc

  • SHA512

    a85524ede477163bad01eb1cf2595ff1056207265e8e1358681129ce46392a7f569b46b600687095525623421c727867ea53bc09c1ff7b57d1c4c4446263d090

  • SSDEEP

    24576:MAbFF+p38UDf3o4YTOzJrh/3+WLH1jHLJ3k+UKTiRZ3IxjGIgm6GFprMlJD9GRNO:vbf+l8UDDQmrHiRZYxlPW3j

Malware Config

Targets

    • Target

      Loader.rar

    • Size

      2.0MB

    • MD5

      8671554bf9863c593f84d79c447a20dd

    • SHA1

      cd7a78b0bed0ca1759eb670f70afe3b1106ef321

    • SHA256

      09d6c526462cbfa46905ab552067853e3ef34ff6e2db05de3d9c3e7b2a42decc

    • SHA512

      a85524ede477163bad01eb1cf2595ff1056207265e8e1358681129ce46392a7f569b46b600687095525623421c727867ea53bc09c1ff7b57d1c4c4446263d090

    • SSDEEP

      24576:MAbFF+p38UDf3o4YTOzJrh/3+WLH1jHLJ3k+UKTiRZ3IxjGIgm6GFprMlJD9GRNO:vbf+l8UDDQmrHiRZYxlPW3j

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Detected potential entity reuse from brand MICROSOFT.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks