Resubmissions

01/03/2025, 12:05

250301-n9ewpszxft 10

01/03/2025, 12:02

250301-n7vjda1mv9 8

01/03/2025, 12:00

250301-n6askszwhw 10

01/03/2025, 11:57

250301-n4qe9a1lw5 8

01/03/2025, 11:54

250301-n246mazwby 8

01/03/2025, 11:51

250301-n1j43a1kx6 10

01/03/2025, 11:48

250301-nyxmda1kt4 6

01/03/2025, 11:46

250301-nxbzaa1jz4 10

General

  • Target

    https://github.com/enginestein/Virus-Collection/tree/main/Windows/Binaries/Ransomware/GoldenEye

  • Sample

    250301-nxbzaa1jz4

Malware Config

Targets

    • Target

      https://github.com/enginestein/Virus-Collection/tree/main/Windows/Binaries/Ransomware/GoldenEye

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • Mimikatz family

    • mimikatz is an open source tool to dump credentials on Windows

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks