General

  • Target

    noorcapital4setup.exe

  • Size

    3.7MB

  • Sample

    240628-j9pnpazckd

  • MD5

    05f9a8a465ceaf922d0b7249f71d78f8

  • SHA1

    529963ff63bbc84870ca45af0e80ff65c0136692

  • SHA256

    bd123babc886b0b3aaab013827c3a080143eadfb346a26b30dde84f68f867008

  • SHA512

    185713c3b8f2048436a2870c8b3629e9c483a470f5c1e5e69f60906011c262cef78947742ab85b6d77982163bd95d868b7033018c96d5f9667c381fc7dd6de9c

  • SSDEEP

    49152:tRYoIw3uoh6NlNEaIQRabeApmIHbeuUzTu+xFpCuDHwb0X3nN6:rMAh6NlNuyukxFVHQSd6

Malware Config

Targets

    • Target

      noorcapital4setup.exe

    • Size

      3.7MB

    • MD5

      05f9a8a465ceaf922d0b7249f71d78f8

    • SHA1

      529963ff63bbc84870ca45af0e80ff65c0136692

    • SHA256

      bd123babc886b0b3aaab013827c3a080143eadfb346a26b30dde84f68f867008

    • SHA512

      185713c3b8f2048436a2870c8b3629e9c483a470f5c1e5e69f60906011c262cef78947742ab85b6d77982163bd95d868b7033018c96d5f9667c381fc7dd6de9c

    • SSDEEP

      49152:tRYoIw3uoh6NlNEaIQRabeApmIHbeuUzTu+xFpCuDHwb0X3nN6:rMAh6NlNuyukxFVHQSd6

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks