General

  • Target

    test.exe

  • Size

    164KB

  • Sample

    250330-ek7ezszsgz

  • MD5

    2369fa6bdd5e97a7dcd2aea9d7f39dca

  • SHA1

    f1cdfc5fffaa82131c2f5c881de155e37dcfc469

  • SHA256

    a4ba4c1c540627c04f01f592c422996497c8ab882a4329d297de11289667ebb1

  • SHA512

    a4705fef7da26a96547685e61524b2b742be9daeb282bdebbc16c48a4b22dc0796f95211737b28b33abe5de4bdf82664c9811b3889e035ef54d0e072dca25cb2

  • SSDEEP

    3072:PbyC/42vwqdUEBCVbFFtsJH4jyrbNeUCNo6wv1mo:PbBubFFthjKbe4P

Malware Config

Targets

    • Target

      test.exe

    • Size

      164KB

    • MD5

      2369fa6bdd5e97a7dcd2aea9d7f39dca

    • SHA1

      f1cdfc5fffaa82131c2f5c881de155e37dcfc469

    • SHA256

      a4ba4c1c540627c04f01f592c422996497c8ab882a4329d297de11289667ebb1

    • SHA512

      a4705fef7da26a96547685e61524b2b742be9daeb282bdebbc16c48a4b22dc0796f95211737b28b33abe5de4bdf82664c9811b3889e035ef54d0e072dca25cb2

    • SSDEEP

      3072:PbyC/42vwqdUEBCVbFFtsJH4jyrbNeUCNo6wv1mo:PbBubFFthjKbe4P

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks