General
-
Target
sample
-
Size
4KB
-
Sample
250114-ta8ydsskfx
-
MD5
636dda5207c6cce1716578b5718a39b6
-
SHA1
c5e8fa98ec7cf323f0ac946ecbf6ae612699dece
-
SHA256
0ca390091f158fd125d984f09098b8f069bbad079cbdc1f1045df78f0339893d
-
SHA512
f613b65cf74bd077694545db833c4283ad236ec3ce9eaeb296eecdaef0ff620e04b9c7e0922a481986222c8916ad24401b1305d733a6b14a5b8298a30888909e
-
SSDEEP
48:Jv3nmA2B1wjPIJlPJlfJlGJlOk57TFQ/POp/ssT:heB1wjklhlRlClOk57RQ/POp/s2
Static task
static1
Malware Config
Targets
-
-
Target
sample
-
Size
4KB
-
MD5
636dda5207c6cce1716578b5718a39b6
-
SHA1
c5e8fa98ec7cf323f0ac946ecbf6ae612699dece
-
SHA256
0ca390091f158fd125d984f09098b8f069bbad079cbdc1f1045df78f0339893d
-
SHA512
f613b65cf74bd077694545db833c4283ad236ec3ce9eaeb296eecdaef0ff620e04b9c7e0922a481986222c8916ad24401b1305d733a6b14a5b8298a30888909e
-
SSDEEP
48:Jv3nmA2B1wjPIJlPJlfJlGJlOk57TFQ/POp/ssT:heB1wjklhlRlClOk57RQ/POp/s2
-
Downloads MZ/PE file
-
A potential corporate email address has been identified in the URL: [email protected]
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1