General

  • Target

    main.py

  • Size

    5KB

  • Sample

    241221-r1c8as1peq

  • MD5

    04975f67a42a8ca411e9368975a1bfc3

  • SHA1

    34c31c7a3fcde1d45e04e1d7abbea1b418fa79c2

  • SHA256

    f85a61f3d5499bfc7b7477d9a660520c532c1f4717363503595a746020e18552

  • SHA512

    a8fa42964dfef8b008ecfbba55e61feb4d3d37159d696699bfa4552ce67c7205df05bf80d3aed8250712b449837000c51bd2450dd119106f72c6f6d089659db8

  • SSDEEP

    96:58J9FhH9HNdC/bPMdE9SNiLoJQvxDqncnyD9jFwU7B/Nyb0geANIbHV+y:aJ9FhdKD7NtqncnS5pBcc+y

Malware Config

Targets

    • Target

      main.py

    • Size

      5KB

    • MD5

      04975f67a42a8ca411e9368975a1bfc3

    • SHA1

      34c31c7a3fcde1d45e04e1d7abbea1b418fa79c2

    • SHA256

      f85a61f3d5499bfc7b7477d9a660520c532c1f4717363503595a746020e18552

    • SHA512

      a8fa42964dfef8b008ecfbba55e61feb4d3d37159d696699bfa4552ce67c7205df05bf80d3aed8250712b449837000c51bd2450dd119106f72c6f6d089659db8

    • SSDEEP

      96:58J9FhH9HNdC/bPMdE9SNiLoJQvxDqncnyD9jFwU7B/Nyb0geANIbHV+y:aJ9FhdKD7NtqncnS5pBcc+y

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks