General
-
Target
VoltageRL.exe
-
Size
70.9MB
-
Sample
240409-pb5j5shh4v
-
MD5
eca1ea51fb671ec0cd6e350ae10cee5c
-
SHA1
ad115944babba1f4b664cea266a18e9d4683388d
-
SHA256
1c97e0f3e4d416a7b7afbe94e2229bec1e1c6bc5328b7e67ca1f979b388841a3
-
SHA512
67ff13226ec11da72cb3fbaba720a57f5b689c85fcacdedab6291600441ab10326b504273cd97842b983ebd15279a6ad99eab1682de894ee5daa07cd84f1ebc0
-
SSDEEP
1572864:24/4rzOchP6xlsOpyayHtLYTD7gwVXM80Xn6qYLhCKi+LEx0a/9C7:9kqcdGlsVlH+kwVXM8VBCzv00C7
Static task
static1
Malware Config
Targets
-
-
Target
VoltageRL.exe
-
Size
70.9MB
-
MD5
eca1ea51fb671ec0cd6e350ae10cee5c
-
SHA1
ad115944babba1f4b664cea266a18e9d4683388d
-
SHA256
1c97e0f3e4d416a7b7afbe94e2229bec1e1c6bc5328b7e67ca1f979b388841a3
-
SHA512
67ff13226ec11da72cb3fbaba720a57f5b689c85fcacdedab6291600441ab10326b504273cd97842b983ebd15279a6ad99eab1682de894ee5daa07cd84f1ebc0
-
SSDEEP
1572864:24/4rzOchP6xlsOpyayHtLYTD7gwVXM80Xn6qYLhCKi+LEx0a/9C7:9kqcdGlsVlH+kwVXM8VBCzv00C7
-
Downloads MZ/PE file
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Registers COM server for autorun
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Browser Extensions
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Subvert Trust Controls
1SIP and Trust Provider Hijacking
1