Resubmissions

28/03/2025, 19:50

250328-ykn37azzgv 10

28/03/2025, 19:45

250328-ygeeksslv2 10

28/03/2025, 19:28

250328-x6yn3szybz 10

28/03/2025, 19:13

250328-xxc11szxbt 8

General

  • Target

    PassatHook.exe

  • Size

    14.7MB

  • Sample

    250328-ygeeksslv2

  • MD5

    eafb67ed7734f5561c709b64e6e36b8f

  • SHA1

    d7d5859993759ef0079a92506a9eed6a11fbdf48

  • SHA256

    1c1e61fa3ca755e7f1616263bcf948ce2a22ae9d01dac95d4093f59ec5e42ce3

  • SHA512

    f152eab4c9b4d80ccfb9d9aea316838ea2f10376d681b1371dee02484fa68e8949a05c5fd6536f21939f036bd70cc179e364099d59f3aa3645bb8534b8f2c692

  • SSDEEP

    393216:l++AaWnPOESRAc5OKC4JLXH9ip87knYOwPecB:HtQtgk4JrYp8gYOUf

Malware Config

Targets

    • Target

      PassatHook.exe

    • Size

      14.7MB

    • MD5

      eafb67ed7734f5561c709b64e6e36b8f

    • SHA1

      d7d5859993759ef0079a92506a9eed6a11fbdf48

    • SHA256

      1c1e61fa3ca755e7f1616263bcf948ce2a22ae9d01dac95d4093f59ec5e42ce3

    • SHA512

      f152eab4c9b4d80ccfb9d9aea316838ea2f10376d681b1371dee02484fa68e8949a05c5fd6536f21939f036bd70cc179e364099d59f3aa3645bb8534b8f2c692

    • SSDEEP

      393216:l++AaWnPOESRAc5OKC4JLXH9ip87knYOwPecB:HtQtgk4JrYp8gYOUf

    • Modifies WinLogon for persistence

    • Disables RegEdit via registry modification

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Modifies WinLogon

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks