General

  • Target

    liquidlauncher_0.2.0_x64_en-US.msi

  • Size

    5.4MB

  • Sample

    240109-qsntdsbdgp

  • MD5

    ea701a642a913b23534a46065d6f47f3

  • SHA1

    7f620da5078bed3f8d942eb51b7c8a1567628fb1

  • SHA256

    da946a12320542b32133599e6f4f815a4064993c4f7c9b4311dade8693262897

  • SHA512

    6bd68458812efba730ba50e6c2645147b2a22e5f3d507f07103ee7af21a8b6e97915d4ba91db59b14b9f2db7d9960dd6899ee3a3afa082461409bc9b5ea7da35

  • SSDEEP

    98304:5W9Y3GEdGHzryhz++8uGxH5esA7EltV+eIiOSdWluFU0HeJpayUHQOrm:om2EUyhK+8uGxH5esD7geKiTb+JpayUK

Score
8/10

Malware Config

Targets

    • Target

      liquidlauncher_0.2.0_x64_en-US.msi

    • Size

      5.4MB

    • MD5

      ea701a642a913b23534a46065d6f47f3

    • SHA1

      7f620da5078bed3f8d942eb51b7c8a1567628fb1

    • SHA256

      da946a12320542b32133599e6f4f815a4064993c4f7c9b4311dade8693262897

    • SHA512

      6bd68458812efba730ba50e6c2645147b2a22e5f3d507f07103ee7af21a8b6e97915d4ba91db59b14b9f2db7d9960dd6899ee3a3afa082461409bc9b5ea7da35

    • SSDEEP

      98304:5W9Y3GEdGHzryhz++8uGxH5esA7EltV+eIiOSdWluFU0HeJpayUHQOrm:om2EUyhK+8uGxH5esD7geKiTb+JpayUK

    Score
    8/10
    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Registers COM server for autorun

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks