General

  • Target

    Voice.ai-Downloader-alphaver-97d479c7a7e743d5a1972269557f7430.exe

  • Size

    98KB

  • Sample

    221125-scx38sac3t

  • MD5

    ebf75d28c7101b265932766c384d841a

  • SHA1

    58affa66fd8ad5510532c04db52c537670b98587

  • SHA256

    c13cf348d683b93587c916046060a76c280e9aa38b8427ee47b316dc9540c5bb

  • SHA512

    811e78cb6f4da53900f3686de817c87a8062e16a865761d80d807474c6c23919719f70d164b1e823035a6b1d195b56b45dc92f7a74fa56079bc8e2ee4ec25839

  • SSDEEP

    3072:ykBGWOsTIJgIDU5A/czY6tCNe6y4wMD9ZGYmfxO3:y1ssjuttCtb6+

Malware Config

Targets

    • Target

      Voice.ai-Downloader-alphaver-97d479c7a7e743d5a1972269557f7430.exe

    • Size

      98KB

    • MD5

      ebf75d28c7101b265932766c384d841a

    • SHA1

      58affa66fd8ad5510532c04db52c537670b98587

    • SHA256

      c13cf348d683b93587c916046060a76c280e9aa38b8427ee47b316dc9540c5bb

    • SHA512

      811e78cb6f4da53900f3686de817c87a8062e16a865761d80d807474c6c23919719f70d164b1e823035a6b1d195b56b45dc92f7a74fa56079bc8e2ee4ec25839

    • SSDEEP

      3072:ykBGWOsTIJgIDU5A/czY6tCNe6y4wMD9ZGYmfxO3:y1ssjuttCtb6+

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks