Resubmissions

10/04/2025, 15:47

250410-s76nvswtgz 8

10/04/2025, 13:03

250410-qavh8asl12 8

General

  • Target

    Desktop.rar

  • Size

    45.7MB

  • Sample

    250410-qavh8asl12

  • MD5

    8e63373e90766f517978814a5a4e367d

  • SHA1

    d5838de7eb03ba1e5521dcdee1382f2749885860

  • SHA256

    485d858572f7b2d02edc24b9d1186c06673a6452789e3aa166e45f86368a77cb

  • SHA512

    d445f8c815ba4c0d14ef11eeab63886aacdd9d90503760167fe964349c27dd3f2fbc45f3e8a26941eefecc7216177b6b2529dee4a4daf24a47aadaa157378a95

  • SSDEEP

    786432:6bklmNIhQsn58RlmlyLFeKCvtPHTkcafqObmb3r/wuaMz234C0w7v4Vj:6Alm/RQoLYKCVHTk5f1dK2Xv41

Malware Config

Targets

    • Target

      emurTpTQ42.exe

    • Size

      21.2MB

    • MD5

      58ab4d47530ed9b9e89220b3c7a96d5a

    • SHA1

      dd46a31cb8bb6b9eb00312e99112ac37106f39b7

    • SHA256

      b7183dfc8fe333c2ce4c28490601c5ad73a968bc3e79160b2fa980edd249f7eb

    • SHA512

      1b6686ef7e354b627a0252faac3a583f0efbd6b0e77742cc14350ce5c89a3039bb2ac5070baca7da40aee540315d2c5c01eedc38e06d6919a77cf95435d7bdc7

    • SSDEEP

      393216:CmI4K7p6jYFpzXpfKnAxNrAdcenDfHI+FL9AaTW0HM6Go:CJ4UpTXpfBHrMn1uKW0sNo

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Detected potential entity reuse from brand MICROSOFT.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v16

Tasks