General
-
Target
saikucord.exe
-
Size
8.4MB
-
Sample
250208-ybtbjsznc1
-
MD5
260712bf45b34f65d693fc351b782095
-
SHA1
6c9e34a4e17bd1d3a1ab57b74ac5b202036bd263
-
SHA256
b9e83c9540c89607016af6d8f8e10159b3cd6724573f84d874f156c1ae0a1fe4
-
SHA512
3f69e12d64394fce33a7f0039e5620acbd95fc7a64c4e10c87aa3a2ca47e0f4b0c8b513de8b8e8ea6aa7aa51d63f037a4b9ec564afa5a0d7f03ba784a7ff7cbe
-
SSDEEP
196608:UmDRkdDwfI9jUCBB7m+mKOY7rXrZu6SELooDmhfvsbnTNWK:pa2IHL7HmBYXrkRoaUNt
Behavioral task
behavioral1
Sample
saikucord.exe
Resource
win10ltsc2021-20250207-en
Malware Config
Targets
-
-
Target
saikucord.exe
-
Size
8.4MB
-
MD5
260712bf45b34f65d693fc351b782095
-
SHA1
6c9e34a4e17bd1d3a1ab57b74ac5b202036bd263
-
SHA256
b9e83c9540c89607016af6d8f8e10159b3cd6724573f84d874f156c1ae0a1fe4
-
SHA512
3f69e12d64394fce33a7f0039e5620acbd95fc7a64c4e10c87aa3a2ca47e0f4b0c8b513de8b8e8ea6aa7aa51d63f037a4b9ec564afa5a0d7f03ba784a7ff7cbe
-
SSDEEP
196608:UmDRkdDwfI9jUCBB7m+mKOY7rXrZu6SELooDmhfvsbnTNWK:pa2IHL7HmBYXrkRoaUNt
-
Deletes Windows Defender Definitions
Uses mpcmdrun utility to delete all AV definitions.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1