General

  • Target

    WarzoneCheat.py

  • Size

    5.2MB

  • Sample

    240523-szhbasfg9x

  • MD5

    d491439827e0fe5fe470e0d681ac5002

  • SHA1

    f88367bf4b313113cc9d39c3d836db6f4e96a445

  • SHA256

    f34cf613acec75671acf4090921675e6d1ff2e3145e6325e858e3cff7ec79548

  • SHA512

    2949c702124c917eed2d244f6b8216db916aed2040018d38aa5a0ad7464ecbd986c50f11b2cf92a3db9e7153e676c84d63918ea31e1521f87d8e1db077b28dd0

  • SSDEEP

    768:/fTob11xwKHde+57I+dc9EIEHn0hnyAv0HPtcghCYfNW6kARzZ2GqM09HQlMfH5P:ijPM

Malware Config

Targets

    • Target

      WarzoneCheat.py

    • Size

      5.2MB

    • MD5

      d491439827e0fe5fe470e0d681ac5002

    • SHA1

      f88367bf4b313113cc9d39c3d836db6f4e96a445

    • SHA256

      f34cf613acec75671acf4090921675e6d1ff2e3145e6325e858e3cff7ec79548

    • SHA512

      2949c702124c917eed2d244f6b8216db916aed2040018d38aa5a0ad7464ecbd986c50f11b2cf92a3db9e7153e676c84d63918ea31e1521f87d8e1db077b28dd0

    • SSDEEP

      768:/fTob11xwKHde+57I+dc9EIEHn0hnyAv0HPtcghCYfNW6kARzZ2GqM09HQlMfH5P:ijPM

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Registers COM server for autorun

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks