General
-
Target
README.md
-
Size
2KB
-
Sample
250102-n13w6stlhq
-
MD5
0e0474334d2c3b128badbfbcb8635abc
-
SHA1
709fa4aade11af526c95a88fd67f8acf2e7f85af
-
SHA256
e3a1b30b470cbd3d70762bb9cde5f3a1b1ecb7742c66dc3e2cb43cb506f83976
-
SHA512
5fc8c2d29646c3b00fdb76081008227ff19cfaebba568b3737361128759c3a95c28bfd96551085581292b4651a0b2ef4c83d443a1ae253a569a8c14817fab39f
Static task
static1
Behavioral task
behavioral1
Sample
README.md
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
README.md
-
Size
2KB
-
MD5
0e0474334d2c3b128badbfbcb8635abc
-
SHA1
709fa4aade11af526c95a88fd67f8acf2e7f85af
-
SHA256
e3a1b30b470cbd3d70762bb9cde5f3a1b1ecb7742c66dc3e2cb43cb506f83976
-
SHA512
5fc8c2d29646c3b00fdb76081008227ff19cfaebba568b3737361128759c3a95c28bfd96551085581292b4651a0b2ef4c83d443a1ae253a569a8c14817fab39f
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1