General

  • Target

    Animate_Set-Up(1).exe

  • Size

    2.8MB

  • Sample

    230609-1pcxtsde92

  • MD5

    c3f1b6db6bcff9d1c8264e7fd74ba3f1

  • SHA1

    350bd30108ca4855d25bddd8d179d5fc275e1377

  • SHA256

    e2608951f4bb3fb46e38513d1b3fb0b8db942ae7d40e6c5f8229fe4b1a27534b

  • SHA512

    a08e66213350eb2d98f33873debb9bfe49112619f1255342eff3fbc4ac56dd521b15c0873d30969312d84129d8a21f13fb2be9da26465abf6b4194e373a6c6fe

  • SSDEEP

    49152:d51Z7F25DNGy3g9lRC8mk62yFjqGAuf75pqjf8jJPfs/kfwMflf0hchZgtyWP:d515F2W+8ClgduD59fVfwM/aF

Malware Config

Targets

    • Target

      Animate_Set-Up(1).exe

    • Size

      2.8MB

    • MD5

      c3f1b6db6bcff9d1c8264e7fd74ba3f1

    • SHA1

      350bd30108ca4855d25bddd8d179d5fc275e1377

    • SHA256

      e2608951f4bb3fb46e38513d1b3fb0b8db942ae7d40e6c5f8229fe4b1a27534b

    • SHA512

      a08e66213350eb2d98f33873debb9bfe49112619f1255342eff3fbc4ac56dd521b15c0873d30969312d84129d8a21f13fb2be9da26465abf6b4194e373a6c6fe

    • SSDEEP

      49152:d51Z7F25DNGy3g9lRC8mk62yFjqGAuf75pqjf8jJPfs/kfwMflf0hchZgtyWP:d515F2W+8ClgduD59fVfwM/aF

    • Bazar Loader

      Detected loader normally used to deploy BazarBackdoor malware.

    • Detected adobe phishing page

    • Bazar/Team9 Loader payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Registers COM server for autorun

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks