Resubmissions

28/03/2025, 17:07

250328-vng79syxes 10

28/03/2025, 17:01

250328-vjwj4a1jt7 8

General

  • Target

    image_2025-03-28_170136899.png

  • Size

    253KB

  • Sample

    250328-vjwj4a1jt7

  • MD5

    2e0003e2bf5591f8e2ab3fbf939610b6

  • SHA1

    b2020e09179a81ce5fe0409c6b1958439ce599db

  • SHA256

    1031187bca73c151782d84b2c0f6efd74fd843071968351baa0b41b4bc59e939

  • SHA512

    c30cb129be0d67e13b1ff504dadd268b10ebd86cc1d62feb97aeaf609e428ecf40dab15908104cc038423cad96279f3e1ad5f4c0ef7b823411d4918589d34b2a

  • SSDEEP

    6144:b52wGQvtCDocvRj3csBfp2UrwyoSYUe/uS9lW:VVCBvRIsD2PyoScuelW

Malware Config

Targets

    • Target

      image_2025-03-28_170136899.png

    • Size

      253KB

    • MD5

      2e0003e2bf5591f8e2ab3fbf939610b6

    • SHA1

      b2020e09179a81ce5fe0409c6b1958439ce599db

    • SHA256

      1031187bca73c151782d84b2c0f6efd74fd843071968351baa0b41b4bc59e939

    • SHA512

      c30cb129be0d67e13b1ff504dadd268b10ebd86cc1d62feb97aeaf609e428ecf40dab15908104cc038423cad96279f3e1ad5f4c0ef7b823411d4918589d34b2a

    • SSDEEP

      6144:b52wGQvtCDocvRj3csBfp2UrwyoSYUe/uS9lW:VVCBvRIsD2PyoScuelW

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Possible privilege escalation attempt

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • System Binary Proxy Execution: Rundll32

      Abuse Rundll32 to proxy execution of malicious code.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Legitimate hosting services abused for malware hosting/C2

    • Network Share Discovery

      Attempt to gather information on host network.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks