General

  • Target

    7dbfe704ef6228a629a284c93851d0fb1900e98e59ebb1bae6e6f9c64aaa7429

  • Size

    80KB

  • Sample

    241224-3wkbla1ner

  • MD5

    b4e97df33272c901130e93485c5361db

  • SHA1

    3ecfcabdbeda349f7b3d6be73ad2599f39dd8469

  • SHA256

    7dbfe704ef6228a629a284c93851d0fb1900e98e59ebb1bae6e6f9c64aaa7429

  • SHA512

    808a7ff601408c4e7f986a22a96e2ba2b360ccf87e6fd8d5985e7f90aa961e93f040ab432baaf256f6b399d8389310cb8d4adee7165db4d8da0bb58b986dfe05

  • SSDEEP

    1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEzX0Du:5dbwovEVyqgoZmZXWfIdQdRaefP81

Malware Config

Targets

    • Target

      7dbfe704ef6228a629a284c93851d0fb1900e98e59ebb1bae6e6f9c64aaa7429

    • Size

      80KB

    • MD5

      b4e97df33272c901130e93485c5361db

    • SHA1

      3ecfcabdbeda349f7b3d6be73ad2599f39dd8469

    • SHA256

      7dbfe704ef6228a629a284c93851d0fb1900e98e59ebb1bae6e6f9c64aaa7429

    • SHA512

      808a7ff601408c4e7f986a22a96e2ba2b360ccf87e6fd8d5985e7f90aa961e93f040ab432baaf256f6b399d8389310cb8d4adee7165db4d8da0bb58b986dfe05

    • SSDEEP

      1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEzX0Du:5dbwovEVyqgoZmZXWfIdQdRaefP81

    • Blocklisted process makes network request

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks