Resubmissions

13-02-2025 11:50

250213-nzyk3axlgp 6

08-02-2025 16:12

250208-tnshkatqgy 3

08-02-2025 16:02

250208-tg942atndt 7

08-02-2025 15:46

250208-s7x2qatjet 7

08-02-2025 13:21

250208-qll18axkfs 6

08-02-2025 13:20

250208-qlbkgsxkcy 6

06-02-2025 21:48

250206-1nslwszngk 8

06-02-2025 21:47

250206-1nn9gaznfp 3

06-02-2025 21:46

250206-1m2s6sxrc1 3

04-02-2025 23:09

250204-25bv5sxkdw 6

General

  • Target

    AnyDesk.exe

  • Size

    5.1MB

  • Sample

    250122-cazahs1rhz

  • MD5

    aee6801792d67607f228be8cec8291f9

  • SHA1

    bf6ba727ff14ca2fddf619f292d56db9d9088066

  • SHA256

    1cdafbe519f60aaadb4a92e266fff709129f86f0c9ee595c45499c66092e0499

  • SHA512

    09d9fc8702ab6fa4fc9323c37bc970b8a7dd180293b0dbf337de726476b0b9515a4f383fa294ba084eccf0698d1e3cb5a39d0ff9ea3ba40c8a56acafce3add4f

  • SSDEEP

    98304:G5WW6KEdJxfpDVOMdq2668yIv1//nvkYCRThGXBJdicotUgwoAo5beyjF:y3vEbxfjf4Y8yofvktkLdurH5iyR

Malware Config

Targets

    • Target

      AnyDesk.exe

    • Size

      5.1MB

    • MD5

      aee6801792d67607f228be8cec8291f9

    • SHA1

      bf6ba727ff14ca2fddf619f292d56db9d9088066

    • SHA256

      1cdafbe519f60aaadb4a92e266fff709129f86f0c9ee595c45499c66092e0499

    • SHA512

      09d9fc8702ab6fa4fc9323c37bc970b8a7dd180293b0dbf337de726476b0b9515a4f383fa294ba084eccf0698d1e3cb5a39d0ff9ea3ba40c8a56acafce3add4f

    • SSDEEP

      98304:G5WW6KEdJxfpDVOMdq2668yIv1//nvkYCRThGXBJdicotUgwoAo5beyjF:y3vEbxfjf4Y8yofvktkLdurH5iyR

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Downloads MZ/PE file

    • Legitimate hosting services abused for malware hosting/C2

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Detected potential entity reuse from brand MICROSOFT.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks