General

  • Target

    ProjectXPlayerLauncher (1).exe

  • Size

    873KB

  • Sample

    240521-x3k9ksfg35

  • MD5

    59728bdc1c21befe5f75978199714d39

  • SHA1

    07b2ad79ea99103f1c2b63c8f0e2f0914b00aa56

  • SHA256

    6fd40d0c186858b2c58dca73d2e78d5114d7e37c100b5c4abb4b5496f26fc063

  • SHA512

    9c9ed80bbd0fdef7fc5a73e5e98831ef41dd0080943bab1fb16205d4396754546d0c5836bd4a0f9fce2dc60d732ba0e751ff8230cc59c30c738aabc3ba671c8c

  • SSDEEP

    24576:1uCmYrfJWZG6MIP52IvYTTa1Z+oMDxgTr/t:1ZPOtvYTTA+oMNEr/t

Malware Config

Targets

    • Target

      ProjectXPlayerLauncher (1).exe

    • Size

      873KB

    • MD5

      59728bdc1c21befe5f75978199714d39

    • SHA1

      07b2ad79ea99103f1c2b63c8f0e2f0914b00aa56

    • SHA256

      6fd40d0c186858b2c58dca73d2e78d5114d7e37c100b5c4abb4b5496f26fc063

    • SHA512

      9c9ed80bbd0fdef7fc5a73e5e98831ef41dd0080943bab1fb16205d4396754546d0c5836bd4a0f9fce2dc60d732ba0e751ff8230cc59c30c738aabc3ba671c8c

    • SSDEEP

      24576:1uCmYrfJWZG6MIP52IvYTTa1Z+oMDxgTr/t:1ZPOtvYTTA+oMNEr/t

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks