General

  • Target

    logitech-g-hub-2022-1-3492.exe

  • Size

    39.6MB

  • Sample

    240714-y5sxwawbrg

  • MD5

    1eb0f38e4807ff48f00b82abcdd9051d

  • SHA1

    8fb4f839c259a46c62b67da139a0d6e9566c0b10

  • SHA256

    9f8cb016856c9576ab2a1bfb2ad32e8c2e3f11aa8b3c001471137dd4b6803a86

  • SHA512

    c5ec1cdecd6415f8c04c5c8ea9c282fe6c20301d9163dd3b547fc240ccd3d4becae4c8e7c9e5219d6245ce5ebd9b1c084969527f1a568717997e99c48794e860

  • SSDEEP

    786432:L0s7fbEpttD7yBG/4M3OW+upttD7yBG/PcXU9g5U:L0UEpttD7y0/pnpttD7y0/0XUm5U

Malware Config

Targets

    • Target

      logitech-g-hub-2022-1-3492.exe

    • Size

      39.6MB

    • MD5

      1eb0f38e4807ff48f00b82abcdd9051d

    • SHA1

      8fb4f839c259a46c62b67da139a0d6e9566c0b10

    • SHA256

      9f8cb016856c9576ab2a1bfb2ad32e8c2e3f11aa8b3c001471137dd4b6803a86

    • SHA512

      c5ec1cdecd6415f8c04c5c8ea9c282fe6c20301d9163dd3b547fc240ccd3d4becae4c8e7c9e5219d6245ce5ebd9b1c084969527f1a568717997e99c48794e860

    • SSDEEP

      786432:L0s7fbEpttD7yBG/4M3OW+upttD7yBG/PcXU9g5U:L0UEpttD7y0/pnpttD7y0/0XUm5U

    • Drops file in Drivers directory

    • Adds Run key to start application

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks