General

  • Target

    7a77dec7a2a6cd2769e82ea0fd053881853c0f7612e605c41758952629740c19

  • Size

    80KB

  • Sample

    241218-ah45mavqfn

  • MD5

    b07174fc391992f4bd743300a0fe745b

  • SHA1

    8abfbd6137e367e13bc1a48210188dfbb7d46604

  • SHA256

    7a77dec7a2a6cd2769e82ea0fd053881853c0f7612e605c41758952629740c19

  • SHA512

    028cfc33a66ea62cf9c3b7731146e97f7042f20224bed9a922ef97b5546d4a2f6f06a62f184da51c042d462fcaa5085de0defc3dea47e3efda6dd60e83d60ea7

  • SSDEEP

    1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEMLS:5dbwovEVyqgoZmZXWfIdQdRaefPhLS

Malware Config

Targets

    • Target

      7a77dec7a2a6cd2769e82ea0fd053881853c0f7612e605c41758952629740c19

    • Size

      80KB

    • MD5

      b07174fc391992f4bd743300a0fe745b

    • SHA1

      8abfbd6137e367e13bc1a48210188dfbb7d46604

    • SHA256

      7a77dec7a2a6cd2769e82ea0fd053881853c0f7612e605c41758952629740c19

    • SHA512

      028cfc33a66ea62cf9c3b7731146e97f7042f20224bed9a922ef97b5546d4a2f6f06a62f184da51c042d462fcaa5085de0defc3dea47e3efda6dd60e83d60ea7

    • SSDEEP

      1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEMLS:5dbwovEVyqgoZmZXWfIdQdRaefPhLS

    • Blocklisted process makes network request

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks