General

  • Target

    ReFX.Nexus.v2.2.VSTi.RTAS.DVDR-AiRISO (1).torrent

  • Size

    16KB

  • Sample

    240704-qcg1xazard

  • MD5

    feaed219de986198d9245c2e0b7f4b3d

  • SHA1

    3c3ed558f092922f71a75e88660da09d15a9a192

  • SHA256

    39e4c7aeddc5879d3b222423b5443ea5ed64a8cec5f673821fa7c954c3443000

  • SHA512

    904acf75f231cfdd3d804ba143946b7cf3337a26d0ba97443719c4365105bf0ec9a4504968be771646adb38fe1641da2bdcbca28182a82186b5b71720051a618

  • SSDEEP

    384:bA9DcF67oZaeklR/blO7Q96vNF/lFOLqs1w:bMoAoZIR/blaQ96F8Lt1w

Malware Config

Targets

    • Target

      ReFX.Nexus.v2.2.VSTi.RTAS.DVDR-AiRISO (1).torrent

    • Size

      16KB

    • MD5

      feaed219de986198d9245c2e0b7f4b3d

    • SHA1

      3c3ed558f092922f71a75e88660da09d15a9a192

    • SHA256

      39e4c7aeddc5879d3b222423b5443ea5ed64a8cec5f673821fa7c954c3443000

    • SHA512

      904acf75f231cfdd3d804ba143946b7cf3337a26d0ba97443719c4365105bf0ec9a4504968be771646adb38fe1641da2bdcbca28182a82186b5b71720051a618

    • SSDEEP

      384:bA9DcF67oZaeklR/blO7Q96vNF/lFOLqs1w:bMoAoZIR/blaQ96F8Lt1w

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks for any installed AV software in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks