General

  • Target

    PixelGunCheat.dll

  • Size

    1015KB

  • Sample

    240707-ejlf5atapp

  • MD5

    b8363f0426cf3c667fe260827f9ab9b3

  • SHA1

    4d3068815f4278e8cb82350dd151b7d3695f0bc8

  • SHA256

    13b85a7c19320d65a23737d64555b7b1bedf1f4e216241d5bc45f1a9cdc13130

  • SHA512

    b28f28fbe4284bad29d03a53fe66eab87a63f2fedd296cebb13c6d7a967a9c9f115950b44651a2d44164a12776ae0ed6fbc49efd08239b2a2ba6f33ec42ac251

  • SSDEEP

    24576:wSLVkhdDiTSfrJk0U9BDnYgFbmCraknprkxXGiP0eq:nLVifVkVmCrhnpSP0

Malware Config

Targets

    • Target

      PixelGunCheat.dll

    • Size

      1015KB

    • MD5

      b8363f0426cf3c667fe260827f9ab9b3

    • SHA1

      4d3068815f4278e8cb82350dd151b7d3695f0bc8

    • SHA256

      13b85a7c19320d65a23737d64555b7b1bedf1f4e216241d5bc45f1a9cdc13130

    • SHA512

      b28f28fbe4284bad29d03a53fe66eab87a63f2fedd296cebb13c6d7a967a9c9f115950b44651a2d44164a12776ae0ed6fbc49efd08239b2a2ba6f33ec42ac251

    • SSDEEP

      24576:wSLVkhdDiTSfrJk0U9BDnYgFbmCraknprkxXGiP0eq:nLVifVkVmCrhnpSP0

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks