General

  • Target

    File Minecraft Story Mode.Complete Season.zi...msi

  • Size

    4.5MB

  • Sample

    240219-t7ze8agd6v

  • MD5

    b63bd820a14d8acfbda0eedd7a884268

  • SHA1

    207cbda7e194c02e076984b3ee8edde9475ae426

  • SHA256

    bc7cacf8352f528b20702cd768f57927f7b4c5b697f61942a8574eee9a7de050

  • SHA512

    c632b2a211f8a3e121c927e83a280db4a871d57764557d4b30e3a343ee018fac91a1d5eb9d53d5b61277fe8930c52850981de6fad104522c3e8afc33932999be

  • SSDEEP

    49152:I9ReWK9YwPhH9D+05jvLHd3P9zmH5HhvRaleHBG5q7vG6f4dCItiGS5oW8XlT45N:KmD+ypP0qlehb+Wai0V4BP

Score
8/10

Malware Config

Targets

    • Target

      File Minecraft Story Mode.Complete Season.zi...msi

    • Size

      4.5MB

    • MD5

      b63bd820a14d8acfbda0eedd7a884268

    • SHA1

      207cbda7e194c02e076984b3ee8edde9475ae426

    • SHA256

      bc7cacf8352f528b20702cd768f57927f7b4c5b697f61942a8574eee9a7de050

    • SHA512

      c632b2a211f8a3e121c927e83a280db4a871d57764557d4b30e3a343ee018fac91a1d5eb9d53d5b61277fe8930c52850981de6fad104522c3e8afc33932999be

    • SSDEEP

      49152:I9ReWK9YwPhH9D+05jvLHd3P9zmH5HhvRaleHBG5q7vG6f4dCItiGS5oW8XlT45N:KmD+ypP0qlehb+Wai0V4BP

    Score
    8/10
    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks