General
-
Target
ReFX.Nexus.v2.2.VSTi.RTAS.DVDR-AiRISO (1).torrent
-
Size
16KB
-
Sample
240704-qcg1xazard
-
MD5
feaed219de986198d9245c2e0b7f4b3d
-
SHA1
3c3ed558f092922f71a75e88660da09d15a9a192
-
SHA256
39e4c7aeddc5879d3b222423b5443ea5ed64a8cec5f673821fa7c954c3443000
-
SHA512
904acf75f231cfdd3d804ba143946b7cf3337a26d0ba97443719c4365105bf0ec9a4504968be771646adb38fe1641da2bdcbca28182a82186b5b71720051a618
-
SSDEEP
384:bA9DcF67oZaeklR/blO7Q96vNF/lFOLqs1w:bMoAoZIR/blaQ96F8Lt1w
Static task
static1
Behavioral task
behavioral1
Sample
ReFX.Nexus.v2.2.VSTi.RTAS.DVDR-AiRISO (1).torrent
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
ReFX.Nexus.v2.2.VSTi.RTAS.DVDR-AiRISO (1).torrent
-
Size
16KB
-
MD5
feaed219de986198d9245c2e0b7f4b3d
-
SHA1
3c3ed558f092922f71a75e88660da09d15a9a192
-
SHA256
39e4c7aeddc5879d3b222423b5443ea5ed64a8cec5f673821fa7c954c3443000
-
SHA512
904acf75f231cfdd3d804ba143946b7cf3337a26d0ba97443719c4365105bf0ec9a4504968be771646adb38fe1641da2bdcbca28182a82186b5b71720051a618
-
SSDEEP
384:bA9DcF67oZaeklR/blO7Q96vNF/lFOLqs1w:bMoAoZIR/blaQ96F8Lt1w
-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Checks for any installed AV software in registry
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Defense Evasion
Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1