General

  • Target

    view

  • Size

    82KB

  • Sample

    250401-c9sl1sstcz

  • MD5

    ee9ce2fcebf961aee5fae3214265af84

  • SHA1

    5977ecacde7825d44c19e7f27dd30d8f32dff953

  • SHA256

    9955cfdd499762a979e634981e31b3a23719fd9ca22a21f00db6a2051886f44c

  • SHA512

    c97f76273711fab6e85ed3500c8aa86f4a4f8e5a11d1786f96aa8d742f98f402c9fd3a0e5f136beb608dbeaeef8378e606e8de14f4ffe4b2ae061aeb5b59b1f4

  • SSDEEP

    1536:jFWjAA+X0D7rsPcG86uzczGDaxfwiBQ2/zV7:B87r8cz68czPwiXN

Malware Config

Targets

    • Target

      view

    • Size

      82KB

    • MD5

      ee9ce2fcebf961aee5fae3214265af84

    • SHA1

      5977ecacde7825d44c19e7f27dd30d8f32dff953

    • SHA256

      9955cfdd499762a979e634981e31b3a23719fd9ca22a21f00db6a2051886f44c

    • SHA512

      c97f76273711fab6e85ed3500c8aa86f4a4f8e5a11d1786f96aa8d742f98f402c9fd3a0e5f136beb608dbeaeef8378e606e8de14f4ffe4b2ae061aeb5b59b1f4

    • SSDEEP

      1536:jFWjAA+X0D7rsPcG86uzczGDaxfwiBQ2/zV7:B87r8cz68czPwiXN

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Network Share Discovery

      Attempt to gather information on host network.

    • Detected potential entity reuse from brand STEAM.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks