General

  • Target

    https://mega.nz/file/2ERzlKDa#ChXnSq8pVbDIrzPkGyC3PMDxo6XTHwIe_a_wTAVN-LI

  • Sample

    240527-r4kfsafh7w

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://www.python.org/ftp/python/3.10.5/python-3.10.5-amd64.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://developer.download.nvidia.com/compute/cuda/12.2.0/network_installers/cuda_12.2.0_windows_network.exe

Targets

    • Target

      https://mega.nz/file/2ERzlKDa#ChXnSq8pVbDIrzPkGyC3PMDxo6XTHwIe_a_wTAVN-LI

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Registers COM server for autorun

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks