General

  • Target

    33.zip

  • Size

    2.0MB

  • Sample

    250209-a288pa1mbq

  • MD5

    6186f34c1711a00dc417e47ceb97fb7f

  • SHA1

    39cd8e0ec8ce8c4505289323d832af733098351d

  • SHA256

    e66ae0ac443b5140a1b35b5aaa6899eea296d9d633988eb044a395a34a887431

  • SHA512

    4b2c9405cd53dc6d9a8b04339472c640855d8a5874aeee7d96a8f6310c561cba318741717458bbca246f3a4009ea52f9c088c66f4c0545ad06d024a5b6f4be07

  • SSDEEP

    49152:Eds5IUlEDThXBJOhHbLfD52MHy1316AXSkAPoa2oQvWei9FM3:EZ5FXaNDbyv6sLu2opeN3

Malware Config

Targets

    • Target

      33.zip

    • Size

      2.0MB

    • MD5

      6186f34c1711a00dc417e47ceb97fb7f

    • SHA1

      39cd8e0ec8ce8c4505289323d832af733098351d

    • SHA256

      e66ae0ac443b5140a1b35b5aaa6899eea296d9d633988eb044a395a34a887431

    • SHA512

      4b2c9405cd53dc6d9a8b04339472c640855d8a5874aeee7d96a8f6310c561cba318741717458bbca246f3a4009ea52f9c088c66f4c0545ad06d024a5b6f4be07

    • SSDEEP

      49152:Eds5IUlEDThXBJOhHbLfD52MHy1316AXSkAPoa2oQvWei9FM3:EZ5FXaNDbyv6sLu2opeN3

    • NetSupport

      NetSupport is a remote access tool sold as a legitimate system administration software.

    • Netsupport family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks