General

  • Target

    RPG_Maker_MV-1234450.exe

  • Size

    8.6MB

  • Sample

    230201-y7jf8abh84

  • MD5

    9595e49300c884ea972200f03d7551aa

  • SHA1

    32266d5316e4a71037304a73b71970e422d0c4c7

  • SHA256

    a4c8b95638e736bfd4cabdf43121ebb65229c3754a2bb35ffe9a81a8091c2d16

  • SHA512

    137b8559d7e4e0f2a11b97a2caacc6f466f62a136c0f3f36e5d65b6dabdad073fb7eb32805b26951aa0328a6958731fb2a80b9e2f063a3a3d0b0d44feddd6915

  • SSDEEP

    196608:nYpCIpmIFYMo/QLR2MAIjAuthPIhrJm7i7fTrlWqLo:YhYMrLA+jZPEJLdWt

Malware Config

Targets

    • Target

      RPG_Maker_MV-1234450.exe

    • Size

      8.6MB

    • MD5

      9595e49300c884ea972200f03d7551aa

    • SHA1

      32266d5316e4a71037304a73b71970e422d0c4c7

    • SHA256

      a4c8b95638e736bfd4cabdf43121ebb65229c3754a2bb35ffe9a81a8091c2d16

    • SHA512

      137b8559d7e4e0f2a11b97a2caacc6f466f62a136c0f3f36e5d65b6dabdad073fb7eb32805b26951aa0328a6958731fb2a80b9e2f063a3a3d0b0d44feddd6915

    • SSDEEP

      196608:nYpCIpmIFYMo/QLR2MAIjAuthPIhrJm7i7fTrlWqLo:YhYMrLA+jZPEJLdWt

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks