General

  • Target

    4kvideodownloader_4.23.3_x64_online.exe

  • Size

    849KB

  • Sample

    230319-dxe1tsgg2y

  • MD5

    79fb9162155973833eb0ba120c4c4759

  • SHA1

    bc2eefdb2113bddb89feb9a4e60b2526df8ce6f4

  • SHA256

    c66ec8d0947032dfeedda104c3e225b789ed4e6030d7befff9ddf8b97be9722b

  • SHA512

    9eac2844635f68dfee1fdf84a0404547f57c8543965c7b8a96b0be08f2f7228d3777bf0997adca681625dc307dc9d0ac2e742ff114ba6703e039373ab71e580f

  • SSDEEP

    12288:1zNB0JfiwSdYSui8zZH94I3H1v1Sfmi2VFKF+I/yvAQsW6Py0/b1:hNsfiTdYSuVzZH9tH1v14mTscAfa0

Malware Config

Targets

    • Target

      4kvideodownloader_4.23.3_x64_online.exe

    • Size

      849KB

    • MD5

      79fb9162155973833eb0ba120c4c4759

    • SHA1

      bc2eefdb2113bddb89feb9a4e60b2526df8ce6f4

    • SHA256

      c66ec8d0947032dfeedda104c3e225b789ed4e6030d7befff9ddf8b97be9722b

    • SHA512

      9eac2844635f68dfee1fdf84a0404547f57c8543965c7b8a96b0be08f2f7228d3777bf0997adca681625dc307dc9d0ac2e742ff114ba6703e039373ab71e580f

    • SSDEEP

      12288:1zNB0JfiwSdYSui8zZH94I3H1v1Sfmi2VFKF+I/yvAQsW6Py0/b1:hNsfiTdYSuVzZH9tH1v14mTscAfa0

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks