General

  • Target

    unnamed.jpg

  • Size

    69KB

  • Sample

    241227-x47tzayjgy

  • MD5

    75aed1d385a7325dc66968457d5c2db6

  • SHA1

    d3d23a01a500161fb09bdfe608dd782c991bbec0

  • SHA256

    962f3aefd2897e2c50d1f1723d6680fb7be719a550a3a1d9b0eff12b2953f890

  • SHA512

    e1d642a10e1e457162dcd84e4a3e845d2aa7877871e90d3d3241efad62ea7cde887579545bdeeaaffcab1297f4782a903d711a8335403239ebf11ad44a0fa60a

  • SSDEEP

    1536:xVeiyYEfLp93ZPcQY2rgQUwIJfXx6VaoIeudPLH34Jead:xEiyFLpxZ0xMg9fJf48xeudzA

Malware Config

Targets

    • Target

      unnamed.jpg

    • Size

      69KB

    • MD5

      75aed1d385a7325dc66968457d5c2db6

    • SHA1

      d3d23a01a500161fb09bdfe608dd782c991bbec0

    • SHA256

      962f3aefd2897e2c50d1f1723d6680fb7be719a550a3a1d9b0eff12b2953f890

    • SHA512

      e1d642a10e1e457162dcd84e4a3e845d2aa7877871e90d3d3241efad62ea7cde887579545bdeeaaffcab1297f4782a903d711a8335403239ebf11ad44a0fa60a

    • SSDEEP

      1536:xVeiyYEfLp93ZPcQY2rgQUwIJfXx6VaoIeudPLH34Jead:xEiyFLpxZ0xMg9fJf48xeudzA

    • Downloads MZ/PE file

    • A potential corporate email address has been identified in the URL: 6633dd5dcff475e6fb744426_&@2x.png

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks