General

  • Target

    Modrinth App_0.7.1_x64_en-US.msi

  • Size

    5.0MB

  • Sample

    240509-qpxl5abg61

  • MD5

    5003486a784143bc96c3577172bbb44a

  • SHA1

    9a960998807126041fae5b4fe9488d7ff3c5ca42

  • SHA256

    b1ac36000cee14b9c36aea4cef7f53ed2e7c18c9534b4ff66f07da11e8c07b59

  • SHA512

    3fd871414cffe35ae649dbb02935eddcad75ee094f2d61f2cef48827dfb852ff3b8e4211f913bf65e4619b2a4989a2807d876a920a105735ac3e59362802ee19

  • SSDEEP

    98304:fNT+6HE4ThcGalSS9d+udj3mYcCqQcgT3XV8tEbETvsDHaLqV710ZZ9rPzrPW:1/HMlS2JxmYcmcg7XGqb6Msq51GP

Malware Config

Targets

    • Target

      Modrinth App_0.7.1_x64_en-US.msi

    • Size

      5.0MB

    • MD5

      5003486a784143bc96c3577172bbb44a

    • SHA1

      9a960998807126041fae5b4fe9488d7ff3c5ca42

    • SHA256

      b1ac36000cee14b9c36aea4cef7f53ed2e7c18c9534b4ff66f07da11e8c07b59

    • SHA512

      3fd871414cffe35ae649dbb02935eddcad75ee094f2d61f2cef48827dfb852ff3b8e4211f913bf65e4619b2a4989a2807d876a920a105735ac3e59362802ee19

    • SSDEEP

      98304:fNT+6HE4ThcGalSS9d+udj3mYcCqQcgT3XV8tEbETvsDHaLqV710ZZ9rPzrPW:1/HMlS2JxmYcmcg7XGqb6Msq51GP

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks