General

  • Target

    spoofer.jar

  • Size

    639KB

  • Sample

    240627-q53hbawgpr

  • MD5

    de2903a8f29d98683f72aaf24bbda691

  • SHA1

    ec1e67c09afa0410685b793c9ef6f1fd64fa6e07

  • SHA256

    66fedddd6c9d24a6a1bf9547b2eaa75bc65db57ab0991f0fa31694449d13af51

  • SHA512

    96157fa67635e0f6aaa09fe0aba92733ca335c9ec76b33420d0dd954828c6318c4a9e90c9147ed115afa2fda73a62f7723ed783d894d2f4f45a5c0c6d199a317

  • SSDEEP

    12288:E/LPQT/1xHuhp4Vj0PmbgW/bRn+9RANWLEg6Z2RT63Auk25sSIdD0q:E/TQLTuT4BrbgWV20WLJ4hAu55vIdD0q

Malware Config

Targets

    • Target

      spoofer.jar

    • Size

      639KB

    • MD5

      de2903a8f29d98683f72aaf24bbda691

    • SHA1

      ec1e67c09afa0410685b793c9ef6f1fd64fa6e07

    • SHA256

      66fedddd6c9d24a6a1bf9547b2eaa75bc65db57ab0991f0fa31694449d13af51

    • SHA512

      96157fa67635e0f6aaa09fe0aba92733ca335c9ec76b33420d0dd954828c6318c4a9e90c9147ed115afa2fda73a62f7723ed783d894d2f4f45a5c0c6d199a317

    • SSDEEP

      12288:E/LPQT/1xHuhp4Vj0PmbgW/bRn+9RANWLEg6Z2RT63Auk25sSIdD0q:E/TQLTuT4BrbgWV20WLJ4hAu55vIdD0q

    • Modifies file permissions

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

File and Directory Permissions Modification

1
T1222

Modify Registry

1
T1112

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Command and Control

Web Service

1
T1102

Tasks