General

  • Target

    chrome.exe

  • Size

    712.9MB

  • Sample

    211029-zm82taagen

  • MD5

    551ea245f2fd84442ba030dfdd736504

  • SHA1

    4fa2298fd34c148594e725dc4dfd8d008257b283

  • SHA256

    feae9fee56e3e88af695d437dd817395e9b1eb8c5fba0d287ce88cb96597d67a

  • SHA512

    4b27d81d5258fb595693d7238c3e42acb759bb944db555a4c8a4d772134104a1666f83f7a9943decb7de4359774ea83f27f7b460e8b9ceabdad8b2f71ec1902b

Malware Config

Targets

    • Target

      chrome.exe

    • Size

      712.9MB

    • MD5

      551ea245f2fd84442ba030dfdd736504

    • SHA1

      4fa2298fd34c148594e725dc4dfd8d008257b283

    • SHA256

      feae9fee56e3e88af695d437dd817395e9b1eb8c5fba0d287ce88cb96597d67a

    • SHA512

      4b27d81d5258fb595693d7238c3e42acb759bb944db555a4c8a4d772134104a1666f83f7a9943decb7de4359774ea83f27f7b460e8b9ceabdad8b2f71ec1902b

    • Registers COM server for autorun

    • Sets service image path in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Tasks