General

  • Target

    55f690964ca5f400e7144002550cb3ef2cb00a0372319b03d7ecdfa7c8bd0295N.exe

  • Size

    204KB

  • Sample

    250216-l5l34sskfp

  • MD5

    57756f480f4971db3eeb0325045d6760

  • SHA1

    5c6766e8124eff43b34eab27bd1fdb23b489e98f

  • SHA256

    55f690964ca5f400e7144002550cb3ef2cb00a0372319b03d7ecdfa7c8bd0295

  • SHA512

    50d84ee7050cd8ac62fa7d32b6bca54058d8b575dbf73b34b08a53633c548597c5e8324465371a03d6ba37e77f40f28bf7cf8f8ce203c8a9e4cc8b4bee1e4b46

  • SSDEEP

    3072:F5u7yT4TVbkuRaX1w71jnRkCoyJTarYWbV+HOFxg+z1WxJsqWkoyjOowUVl/TlA4:FLexkuRaX41xoyJV65gzyZko+ucR

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Targets

    • Target

      55f690964ca5f400e7144002550cb3ef2cb00a0372319b03d7ecdfa7c8bd0295N.exe

    • Size

      204KB

    • MD5

      57756f480f4971db3eeb0325045d6760

    • SHA1

      5c6766e8124eff43b34eab27bd1fdb23b489e98f

    • SHA256

      55f690964ca5f400e7144002550cb3ef2cb00a0372319b03d7ecdfa7c8bd0295

    • SHA512

      50d84ee7050cd8ac62fa7d32b6bca54058d8b575dbf73b34b08a53633c548597c5e8324465371a03d6ba37e77f40f28bf7cf8f8ce203c8a9e4cc8b4bee1e4b46

    • SSDEEP

      3072:F5u7yT4TVbkuRaX1w71jnRkCoyJTarYWbV+HOFxg+z1WxJsqWkoyjOowUVl/TlA4:FLexkuRaX41xoyJV65gzyZko+ucR

    • Modifies WinLogon for persistence

    • Simda family

    • simda

      Simda is an infostealer written in C++.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Modifies WinLogon

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks