General

  • Target

    94434f0d796da42c1baed9ea3e1ee54f36bd91ec6eabc95f4cf9d239bd0b633fN.exe

  • Size

    80KB

  • Sample

    241220-gerhpasjfl

  • MD5

    a93ed204a90019a4f883d9531a2d3270

  • SHA1

    b7f0267c9e69471c60426f6389e48532677b50a6

  • SHA256

    94434f0d796da42c1baed9ea3e1ee54f36bd91ec6eabc95f4cf9d239bd0b633f

  • SHA512

    8e0154827a889340d5c3ca2087381e2cff4ae35117385071f9094ca2014b1abe9aaad6a3c467d7a8d928c3c3971d53f706a761fed01aced35d5b851bf1d61c6b

  • SSDEEP

    1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEtLE7:5dbwovEVyqgoZmZXWfIdQdRaefP6E7

Malware Config

Targets

    • Target

      94434f0d796da42c1baed9ea3e1ee54f36bd91ec6eabc95f4cf9d239bd0b633fN.exe

    • Size

      80KB

    • MD5

      a93ed204a90019a4f883d9531a2d3270

    • SHA1

      b7f0267c9e69471c60426f6389e48532677b50a6

    • SHA256

      94434f0d796da42c1baed9ea3e1ee54f36bd91ec6eabc95f4cf9d239bd0b633f

    • SHA512

      8e0154827a889340d5c3ca2087381e2cff4ae35117385071f9094ca2014b1abe9aaad6a3c467d7a8d928c3c3971d53f706a761fed01aced35d5b851bf1d61c6b

    • SSDEEP

      1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEtLE7:5dbwovEVyqgoZmZXWfIdQdRaefP6E7

    • Blocklisted process makes network request

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks