General

  • Target

    Hiphenatus.exe

  • Size

    39KB

  • Sample

    250415-yjyagazpx4

  • MD5

    97fa7911629571961cbb88dcda8cf4fd

  • SHA1

    06fd2d268f0f9f4dadccec56aeac3195f9d6c672

  • SHA256

    daeaa7ef33eaae8a4cf6684a3974c0353e0dfe0f9faf6f6445c5243f67b49e89

  • SHA512

    fb5450ad5e446e693771fac035cc5ea85ececa9b313bb2814fca7748738a0cfde078de14a37a6311cda76d1e063a55e1372d1009fdf977a230abfca062352bdf

  • SSDEEP

    768:WgcpcUcQc9cbdcmcJN/7chXcGm4kn25CC9irYW3xyyrUbsLmh2JL6E2obx5Xc:WgcpcUcQc9cbdcmcJN/7chXc7yCC9892

Malware Config

Targets

    • Target

      Hiphenatus.exe

    • Size

      39KB

    • MD5

      97fa7911629571961cbb88dcda8cf4fd

    • SHA1

      06fd2d268f0f9f4dadccec56aeac3195f9d6c672

    • SHA256

      daeaa7ef33eaae8a4cf6684a3974c0353e0dfe0f9faf6f6445c5243f67b49e89

    • SHA512

      fb5450ad5e446e693771fac035cc5ea85ececa9b313bb2814fca7748738a0cfde078de14a37a6311cda76d1e063a55e1372d1009fdf977a230abfca062352bdf

    • SSDEEP

      768:WgcpcUcQc9cbdcmcJN/7chXcGm4kn25CC9irYW3xyyrUbsLmh2JL6E2obx5Xc:WgcpcUcQc9cbdcmcJN/7chXc7yCC9892

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Modifies system executable filetype association

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v16

Tasks