Resubmissions

25/06/2024, 14:19

240625-rm6bxsvdkb 6

21/06/2024, 15:11

240621-sknjrsygjm 6

17/06/2024, 17:09

240617-vn6wmawhlb 10

14/06/2024, 13:23

240614-qmxjcawdmm 10

General

  • Target

    FileCenterSetup12.0.16.0.exe

  • Size

    300.4MB

  • Sample

    240625-rm6bxsvdkb

  • MD5

    123556b83a3dad2f59e76602768e9536

  • SHA1

    b402ded286fff73aaf9b32f075bc32029da6d461

  • SHA256

    df2b7f274c484ae5baecb3365b1d9fcc4821facf327ce87724b1be597d0c70a9

  • SHA512

    bc8dc366b404756a55ab40b66bbcccc8d8b366b0f34938c14324d994118602f0be876eaa61234c18eef7ae4e797789da8dd996f023f0f67c0e053e8022dd3506

  • SSDEEP

    6291456:f7u0oceu41pUlsFqvFyeGCIOo7qgB5Fapf5NN9nAug:T9r4vXi5IOyJmfAx

Malware Config

Targets

    • Target

      FileCenterSetup12.0.16.0.exe

    • Size

      300.4MB

    • MD5

      123556b83a3dad2f59e76602768e9536

    • SHA1

      b402ded286fff73aaf9b32f075bc32029da6d461

    • SHA256

      df2b7f274c484ae5baecb3365b1d9fcc4821facf327ce87724b1be597d0c70a9

    • SHA512

      bc8dc366b404756a55ab40b66bbcccc8d8b366b0f34938c14324d994118602f0be876eaa61234c18eef7ae4e797789da8dd996f023f0f67c0e053e8022dd3506

    • SSDEEP

      6291456:f7u0oceu41pUlsFqvFyeGCIOo7qgB5Fapf5NN9nAug:T9r4vXi5IOyJmfAx

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks