Resubmissions

11/03/2025, 15:04

250311-sfzq8swmt5 8

11/03/2025, 14:20

250311-rnmwzavmx7 8

11/03/2025, 13:45

250311-q2pr2svyby 8

10/03/2025, 19:09

250310-xtytbavzcs 8

10/03/2025, 19:01

250310-xplyysvxhz 8

10/03/2025, 18:29

250310-w42ghstps7 8

10/03/2025, 15:21

250310-srpqeazshz 4

10/03/2025, 14:53

250310-r9d6ysyxdv 8

10/03/2025, 14:46

250310-r5e8fsywes 6

09/03/2025, 18:14

250309-wvp25axvd1 10

General

  • Target

    test.txt

  • Size

    18B

  • Sample

    250218-sjbhtatmz4

  • MD5

    5b3f97d48c8751bd031b7ea53545bdb6

  • SHA1

    88be3374c62f23406ec83bb11279f8423bd3f88d

  • SHA256

    d8fce9dd9c65ca143343f7711859a7cffc3c5e656a8b84108183fb769a12ed8b

  • SHA512

    ed2de1eec50310ced4bde8ef6ae4b7902920b007df7b6aeb200cfe9fcc0d36ef05af7526c4675be2feac52831668798d5fe3523175efad6f6549b30f30a0b5d6

Malware Config

Targets

    • Target

      test.txt

    • Size

      18B

    • MD5

      5b3f97d48c8751bd031b7ea53545bdb6

    • SHA1

      88be3374c62f23406ec83bb11279f8423bd3f88d

    • SHA256

      d8fce9dd9c65ca143343f7711859a7cffc3c5e656a8b84108183fb769a12ed8b

    • SHA512

      ed2de1eec50310ced4bde8ef6ae4b7902920b007df7b6aeb200cfe9fcc0d36ef05af7526c4675be2feac52831668798d5fe3523175efad6f6549b30f30a0b5d6

    • Disables service(s)

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • Hawkeye family

    • Modifies Windows Defender DisableAntiSpyware settings

    • Modifies security service

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Disables RegEdit via registry modification

    • Disables use of System Restore points

    • Indicator Removal: Network Share Connection Removal

      Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation.

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks