General
-
Target
megre.exe
-
Size
4.0MB
-
Sample
240628-jgdeysxhle
-
MD5
268e1c293401120cbf8cd6a84dccf2e9
-
SHA1
5724512b69c6ce750a56fcb359d7cffd8de822fd
-
SHA256
b29f7ff6aa3ad15cd643bd3fdd830d5ef9273d276ac122e581d2f9f5767d40d3
-
SHA512
55c044142152a0930c49a7f216315540c0a31e51db5415916f9ba59480bf18c27318943f5549c20aa192145a64359b7c3d39aad59c33b272a75b34f1abb9ba63
-
SSDEEP
98304:pIfqfMQC3igGnRrmOgkDV/OFYiT3rPNBWxBe2O:p8qIyvlm4p/OFNbf4eP
Static task
static1
Behavioral task
behavioral1
Sample
megre.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
megre.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1256150041513562143/LfrA9YKj_eB7YuAhTIl0O-spiEIkK-M3AYcBofAqSotskvUIB1bZRSbod7TXYgA7oLQp
Targets
-
-
Target
megre.exe
-
Size
4.0MB
-
MD5
268e1c293401120cbf8cd6a84dccf2e9
-
SHA1
5724512b69c6ce750a56fcb359d7cffd8de822fd
-
SHA256
b29f7ff6aa3ad15cd643bd3fdd830d5ef9273d276ac122e581d2f9f5767d40d3
-
SHA512
55c044142152a0930c49a7f216315540c0a31e51db5415916f9ba59480bf18c27318943f5549c20aa192145a64359b7c3d39aad59c33b272a75b34f1abb9ba63
-
SSDEEP
98304:pIfqfMQC3igGnRrmOgkDV/OFYiT3rPNBWxBe2O:p8qIyvlm4p/OFNbf4eP
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1