Resubmissions

18-02-2025 09:02

250218-kztqbsyqew 8

General

  • Target

    l2AWsh (1).webp

  • Size

    299KB

  • Sample

    250218-kztqbsyqew

  • MD5

    affa51e6bca1bbeb21a083658f5d6ca2

  • SHA1

    2644a6649e37d66518a389b75237c37bba60709a

  • SHA256

    dc2dbea5f491f9ef06e44d2584dd2adb6a29171f4c5651011e2ccbe6d9461f59

  • SHA512

    1f24eefa11f6f14dc8b78b2b65af9b3e172989268e74a8af440c92e25ddf4d9545002a4a9047af2ff2cbba2b5692b527f7977e74a49cc437fe645720639d823d

  • SSDEEP

    6144:qImQXxEttp71i1VQ8yFlxJR7GWb58GzzY5baxWKsaq5RT9ARVkdWQs4fj:qIVIrz8yTPR7GWbOjNysJs4r

Malware Config

Targets

    • Target

      l2AWsh (1).webp

    • Size

      299KB

    • MD5

      affa51e6bca1bbeb21a083658f5d6ca2

    • SHA1

      2644a6649e37d66518a389b75237c37bba60709a

    • SHA256

      dc2dbea5f491f9ef06e44d2584dd2adb6a29171f4c5651011e2ccbe6d9461f59

    • SHA512

      1f24eefa11f6f14dc8b78b2b65af9b3e172989268e74a8af440c92e25ddf4d9545002a4a9047af2ff2cbba2b5692b527f7977e74a49cc437fe645720639d823d

    • SSDEEP

      6144:qImQXxEttp71i1VQ8yFlxJR7GWb58GzzY5baxWKsaq5RT9ARVkdWQs4fj:qIVIrz8yTPR7GWbOjNysJs4r

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks