General

  • Target

    1Spoofer.exe

  • Size

    6.0MB

  • Sample

    240712-vfe3yathrf

  • MD5

    f76deaa37a5a47ce1d09f85b404c83c8

  • SHA1

    4e685ef3b7bb804a725072cb48f4399ca99a2bb0

  • SHA256

    2edf6c79d7fd3024f87972f90eda1fea0ca905b2eab103160d1c6baf2aa44288

  • SHA512

    474cc28c2f4cf30808145a158c4120246cdf5f48bca00167445cac8c54cdea8ef0ec53f35c5bfe59e0bb65c1d98aa58857b35ae1dd43be18d1b365331a5c3f5a

  • SSDEEP

    196608:ln4KIjae3ILxvid+2G1H9CUj1oQZgPC7nrGG:V47H30b2G1EK1bZioKG

Malware Config

Targets

    • Target

      1Spoofer.exe

    • Size

      6.0MB

    • MD5

      f76deaa37a5a47ce1d09f85b404c83c8

    • SHA1

      4e685ef3b7bb804a725072cb48f4399ca99a2bb0

    • SHA256

      2edf6c79d7fd3024f87972f90eda1fea0ca905b2eab103160d1c6baf2aa44288

    • SHA512

      474cc28c2f4cf30808145a158c4120246cdf5f48bca00167445cac8c54cdea8ef0ec53f35c5bfe59e0bb65c1d98aa58857b35ae1dd43be18d1b365331a5c3f5a

    • SSDEEP

      196608:ln4KIjae3ILxvid+2G1H9CUj1oQZgPC7nrGG:V47H30b2G1EK1bZioKG

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks