General
-
Target
settings.json
-
Size
159B
-
Sample
250216-ggyd1swlhz
-
MD5
bf7c91a40ae1aaa3e7537aaf156780f3
-
SHA1
ace8ec14125ae7320c4efdfc89a82e0e3d2db91f
-
SHA256
c57a017b6865ca78a9a61e1b530084682cfb24c82e399b75e3d51ccbe5f94dc3
-
SHA512
edcfe353a5cf1a3cc3bf78b60df950defd86a5f1d255ef74c17ea916f2c9bc4fe65e4c2a607a3bd7f7abd7ad2c59dfc18c45269c43000a23dffca083859feeb6
Static task
static1
Behavioral task
behavioral1
Sample
settings.json
Resource
win11-20250211-en
Malware Config
Targets
-
-
Target
settings.json
-
Size
159B
-
MD5
bf7c91a40ae1aaa3e7537aaf156780f3
-
SHA1
ace8ec14125ae7320c4efdfc89a82e0e3d2db91f
-
SHA256
c57a017b6865ca78a9a61e1b530084682cfb24c82e399b75e3d51ccbe5f94dc3
-
SHA512
edcfe353a5cf1a3cc3bf78b60df950defd86a5f1d255ef74c17ea916f2c9bc4fe65e4c2a607a3bd7f7abd7ad2c59dfc18c45269c43000a23dffca083859feeb6
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1