General

  • Target

    The ENTITY Put Him In A DEATH LOOP _ RADAR.mp4

  • Size

    109.2MB

  • Sample

    240601-nnjb1aca99

  • MD5

    1fe34aa33fcf2e92f950c46bf8525a66

  • SHA1

    3a6419cf4e5d052ec4584bb07fb15292f0985793

  • SHA256

    f4382ab80c01adddc27bfaab783c38bf390bc3857325bad556079e2885a00785

  • SHA512

    96dd6604f2179a43fa60ebbeff1eefd3e4f34f8ef9cdaea1c5fbc6e30786c78def3801f5479dc38259dccc384a2c794b892a2de56b27522a9133d84868329ee7

  • SSDEEP

    3145728:skdZ0uUrt5siOMLPL1ak18s7v8dJQA1DgzEWpWYQSSy:n6uGui9LPhak18gv8YuD/Wp5QSSy

Malware Config

Targets

    • Target

      The ENTITY Put Him In A DEATH LOOP _ RADAR.mp4

    • Size

      109.2MB

    • MD5

      1fe34aa33fcf2e92f950c46bf8525a66

    • SHA1

      3a6419cf4e5d052ec4584bb07fb15292f0985793

    • SHA256

      f4382ab80c01adddc27bfaab783c38bf390bc3857325bad556079e2885a00785

    • SHA512

      96dd6604f2179a43fa60ebbeff1eefd3e4f34f8ef9cdaea1c5fbc6e30786c78def3801f5479dc38259dccc384a2c794b892a2de56b27522a9133d84868329ee7

    • SSDEEP

      3145728:skdZ0uUrt5siOMLPL1ak18s7v8dJQA1DgzEWpWYQSSy:n6uGui9LPhak18gv8YuD/Wp5QSSy

    • Downloads MZ/PE file

    • Modifies Installed Components in the registry

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Registers COM server for autorun

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

4
T1547

Registry Run Keys / Startup Folder

4
T1547.001

Browser Extensions

1
T1176

Privilege Escalation

Boot or Logon Autostart Execution

4
T1547

Registry Run Keys / Startup Folder

4
T1547.001

Defense Evasion

Modify Registry

6
T1112

Discovery

Query Registry

7
T1012

System Information Discovery

7
T1082

Peripheral Device Discovery

1
T1120

Tasks