Resubmissions

06/03/2025, 19:57 UTC

250306-ypg6fawvfw 3

06/03/2025, 19:51 UTC

250306-yk52pswvaw 3

06/03/2025, 00:33 UTC

250306-awjqvatsgy 3

06/03/2025, 00:28 UTC

250306-asg3vatpy3 4

06/03/2025, 00:20 UTC

250306-amt58atnw5 4

13/02/2025, 18:46 UTC

250213-xerfpa1qhl 8

13/02/2025, 17:15 UTC

250213-vs3d1azqgq 8

03/02/2025, 06:19 UTC

250203-g3pc8svlfl 3

20/12/2024, 21:06 UTC

241220-zxvl6stpcv 3

15/12/2024, 03:29 UTC

241215-d2ekvssngx 4

General

  • Target

    ubuntu2404-amd64-20240523-uk.ps1

  • Size

    1B

  • Sample

    250213-xerfpa1qhl

  • MD5

    f1290186a5d0b1ceab27f4e77c0c5d68

  • SHA1

    aff024fe4ab0fece4091de044c58c9ae4233383a

  • SHA256

    50e721e49c013f00c62cf59f2163542a9d8df02464efeb615d31051b0fddc326

  • SHA512

    aa66509891ad28030349ba9581e8c92528faab6a34349061a44b6f8fcd8d6877a67b05508983f12f8610302d1783401a07ec41c7e9ebd656de34ec60d84d9511

Malware Config

Targets

    • Target

      ubuntu2404-amd64-20240523-uk.ps1

    • Size

      1B

    • MD5

      f1290186a5d0b1ceab27f4e77c0c5d68

    • SHA1

      aff024fe4ab0fece4091de044c58c9ae4233383a

    • SHA256

      50e721e49c013f00c62cf59f2163542a9d8df02464efeb615d31051b0fddc326

    • SHA512

      aa66509891ad28030349ba9581e8c92528faab6a34349061a44b6f8fcd8d6877a67b05508983f12f8610302d1783401a07ec41c7e9ebd656de34ec60d84d9511

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.