General

  • Target

    bd8c6b416be85eb15fe41400211ab6884f2a9481e270f3610c2b4d058eadfe68.exe

  • Size

    80KB

  • Sample

    241218-gp1t4swmb1

  • MD5

    fbf77a7949c96770cf99b80e186c20ed

  • SHA1

    272a23a6f9c0f2475a03a3f49fb4f38667d7f9ef

  • SHA256

    bd8c6b416be85eb15fe41400211ab6884f2a9481e270f3610c2b4d058eadfe68

  • SHA512

    5424ac6cc5ed545231da5f72f476595d287de6f3b17429e1ed31fd3a6c651088ec6ba1504dab0a921d2a37c6b251501a016af87ed806e6b2c3639d4fc4c2cd11

  • SSDEEP

    1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEhR0KXW+OY/j:5dbwovEVyqgoZmZXWfIdQdRaefPCRhVv

Malware Config

Targets

    • Target

      bd8c6b416be85eb15fe41400211ab6884f2a9481e270f3610c2b4d058eadfe68.exe

    • Size

      80KB

    • MD5

      fbf77a7949c96770cf99b80e186c20ed

    • SHA1

      272a23a6f9c0f2475a03a3f49fb4f38667d7f9ef

    • SHA256

      bd8c6b416be85eb15fe41400211ab6884f2a9481e270f3610c2b4d058eadfe68

    • SHA512

      5424ac6cc5ed545231da5f72f476595d287de6f3b17429e1ed31fd3a6c651088ec6ba1504dab0a921d2a37c6b251501a016af87ed806e6b2c3639d4fc4c2cd11

    • SSDEEP

      1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEhR0KXW+OY/j:5dbwovEVyqgoZmZXWfIdQdRaefPCRhVv

    • Blocklisted process makes network request

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks