Resubmissions

30-06-2024 18:29

240630-w47crssckh 10

30-06-2024 18:24

240630-w2dyfasbmb 7

General

  • Target

    AnyplaceControlInstall.exe

  • Size

    5.9MB

  • Sample

    240630-w47crssckh

  • MD5

    de3f653561daa3c88bea49b8a6df874b

  • SHA1

    08720bc41df746aa0a2eb4a4c46ebbbecca0f123

  • SHA256

    a2fa034d006bdbc3ee2a15e55eb647f8097355c288a858da1e309fe8ac1cf0a3

  • SHA512

    a8d237ba7cf89d7101fe42ed4a1c841c934f222ccc2041494bf49f67c4cc9bf190988a7a138860a9aec3e6862cb99663dcde96c93ba40b81a923fc68dae2ac7f

  • SSDEEP

    98304:FtUY9cZjRMe8g7dF1OPYtugGpbNer/xZssPZ31x+B10Q3RAss685EL4bD/vcMTL:FjqN1NZF1OAtugM6vZYRAZiyD/vcMTL

Malware Config

Targets

    • Target

      AnyplaceControlInstall.exe

    • Size

      5.9MB

    • MD5

      de3f653561daa3c88bea49b8a6df874b

    • SHA1

      08720bc41df746aa0a2eb4a4c46ebbbecca0f123

    • SHA256

      a2fa034d006bdbc3ee2a15e55eb647f8097355c288a858da1e309fe8ac1cf0a3

    • SHA512

      a8d237ba7cf89d7101fe42ed4a1c841c934f222ccc2041494bf49f67c4cc9bf190988a7a138860a9aec3e6862cb99663dcde96c93ba40b81a923fc68dae2ac7f

    • SSDEEP

      98304:FtUY9cZjRMe8g7dF1OPYtugGpbNer/xZssPZ31x+B10Q3RAss685EL4bD/vcMTL:FjqN1NZF1OAtugM6vZYRAZiyD/vcMTL

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks