General

  • Target

    JDownloaderSetup.exe

  • Size

    30.3MB

  • Sample

    240621-3ce8javeqe

  • MD5

    c3c3b50075bd5c87cf500c255dd833fd

  • SHA1

    0b3593f15ebc8424919857d08d016b2cda2b5161

  • SHA256

    a43fa3db0a053119f73a7422453e54318a258a947e8c0fda294b09c52b7459fc

  • SHA512

    f9bd8c26a63b3d7cf6d6f0686a93720f9d3007ae2f196bf195815761b5a38f9fb81f2de6400abd842cc634ab68a14db6741436295a0d667e0b51099dbaf13c9d

  • SSDEEP

    786432:w+gAvXxM03iJzr2tqG533+iRdJEozAw5P0r:w+tG0SJuJpOdoh90r

Malware Config

Targets

    • Target

      JDownloaderSetup.exe

    • Size

      30.3MB

    • MD5

      c3c3b50075bd5c87cf500c255dd833fd

    • SHA1

      0b3593f15ebc8424919857d08d016b2cda2b5161

    • SHA256

      a43fa3db0a053119f73a7422453e54318a258a947e8c0fda294b09c52b7459fc

    • SHA512

      f9bd8c26a63b3d7cf6d6f0686a93720f9d3007ae2f196bf195815761b5a38f9fb81f2de6400abd842cc634ab68a14db6741436295a0d667e0b51099dbaf13c9d

    • SSDEEP

      786432:w+gAvXxM03iJzr2tqG533+iRdJEozAw5P0r:w+tG0SJuJpOdoh90r

    • Creates new service(s)

    • Sets service image path in registry

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks for any installed AV software in registry

    • Downloads MZ/PE file

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks