General

  • Target

    KMSpico_11_final_setup.exe

  • Size

    6.6MB

  • Sample

    230226-hdtr4agb43

  • MD5

    78d2d7076e5c3f18ef75e4e570b1e0fe

  • SHA1

    8e15869622584d541465f37a87030f171960b7f1

  • SHA256

    e0c720e092c6c0265f3e2a37f0636a26a7fdefc6a49069c659dbe3c5e35aefd6

  • SHA512

    75e4ddadc01ad2d8ed66d76e7f9899f79f1605e82ebbd60d76e15dfd8f76502f1ca0213ae36fbe3d2d6d4268ebb9621dc88d9f247b69078fdf8ad6e4e4f10997

  • SSDEEP

    196608:A4/yHz6/hnjvDc9L+4NKg0KWT/f+89ve:TaT6pnTSLZLrWT/2uG

Malware Config

Targets

    • Target

      KMSpico_11_final_setup.exe

    • Size

      6.6MB

    • MD5

      78d2d7076e5c3f18ef75e4e570b1e0fe

    • SHA1

      8e15869622584d541465f37a87030f171960b7f1

    • SHA256

      e0c720e092c6c0265f3e2a37f0636a26a7fdefc6a49069c659dbe3c5e35aefd6

    • SHA512

      75e4ddadc01ad2d8ed66d76e7f9899f79f1605e82ebbd60d76e15dfd8f76502f1ca0213ae36fbe3d2d6d4268ebb9621dc88d9f247b69078fdf8ad6e4e4f10997

    • SSDEEP

      196608:A4/yHz6/hnjvDc9L+4NKg0KWT/f+89ve:TaT6pnTSLZLrWT/2uG

    • Luminosity

      Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.

    • Blocklisted process makes network request

    • Creates new service(s)

    • Sets file execution options in registry

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks