General

  • Target

    4kvideodownloaderplus_1.7.0_x64_online.exe

  • Size

    942KB

  • Sample

    240612-jlg9psvdkd

  • MD5

    9b17ab76c97b378a03fbfbf29cabee6f

  • SHA1

    faa3ee5621c53bec49892c277149d41c82a12a6c

  • SHA256

    9ff0459fc38b2277c8a482cbd19ec030c56d25cde0d6c6e390ae8be902aea052

  • SHA512

    a3890c6ff63d389626dfe777d3ae8a03b2f570bfe42ecc58256ae377199e5db1fcde5c2424fbd06d00113c9592f2167ec45c3be7a5e2b34c6780250b1a883cc1

  • SSDEEP

    24576:GNsfiTdYSuVzZH9tH1v133W3ZtxEVFx+tBi5:mT2pZ133WpHEVYw

Malware Config

Targets

    • Target

      4kvideodownloaderplus_1.7.0_x64_online.exe

    • Size

      942KB

    • MD5

      9b17ab76c97b378a03fbfbf29cabee6f

    • SHA1

      faa3ee5621c53bec49892c277149d41c82a12a6c

    • SHA256

      9ff0459fc38b2277c8a482cbd19ec030c56d25cde0d6c6e390ae8be902aea052

    • SHA512

      a3890c6ff63d389626dfe777d3ae8a03b2f570bfe42ecc58256ae377199e5db1fcde5c2424fbd06d00113c9592f2167ec45c3be7a5e2b34c6780250b1a883cc1

    • SSDEEP

      24576:GNsfiTdYSuVzZH9tH1v133W3ZtxEVFx+tBi5:mT2pZ133WpHEVYw

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks