Resubmissions

13/02/2024, 00:11

240213-agzhraeg8t 8

12/02/2024, 23:11

240212-26p46aff34 3

General

  • Target

    Galaxy Swapper v2.exe

  • Size

    4.7MB

  • Sample

    240213-agzhraeg8t

  • MD5

    3b342bccddd3b9e2444a643bd42ebc71

  • SHA1

    e9aa3efd4d3f0a135cb5c304e9edd0555f539c1f

  • SHA256

    28102319adcc684a1f3c85fd4953b21b8b0b0433e35a4f01feea01d6379506d5

  • SHA512

    f925db08cab152d841c9601b900b2804d489b254f574c6f0124e4f41d7f26f209c7b103f2606710370a0af89e94aaf421c96aa31bf1ae552146abf0ccdf58d2e

  • SSDEEP

    98304:TNAlj2vL5CHSHlyFGvFomw3/49sOjNjTUJECByxW5B9ch12dlv+s+SbRSuYPjlFd:TxhsqYgRNcagIeD4uy

Malware Config

Targets

    • Target

      Galaxy Swapper v2.exe

    • Size

      4.7MB

    • MD5

      3b342bccddd3b9e2444a643bd42ebc71

    • SHA1

      e9aa3efd4d3f0a135cb5c304e9edd0555f539c1f

    • SHA256

      28102319adcc684a1f3c85fd4953b21b8b0b0433e35a4f01feea01d6379506d5

    • SHA512

      f925db08cab152d841c9601b900b2804d489b254f574c6f0124e4f41d7f26f209c7b103f2606710370a0af89e94aaf421c96aa31bf1ae552146abf0ccdf58d2e

    • SSDEEP

      98304:TNAlj2vL5CHSHlyFGvFomw3/49sOjNjTUJECByxW5B9ch12dlv+s+SbRSuYPjlFd:TxhsqYgRNcagIeD4uy

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks