General

  • Target

    https://drive.google.com/drive/folders/1W7NV1bn9E7-EdHzvoCaNQcbLY8blz3PE?usp=sharing

  • Sample

    250104-se9j2strew

Malware Config

Targets

    • Target

      https://drive.google.com/drive/folders/1W7NV1bn9E7-EdHzvoCaNQcbLY8blz3PE?usp=sharing

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks