General

  • Target

    Windscribe_2.10.15.exe

  • Size

    24.6MB

  • Sample

    240714-zypgjswfnf

  • MD5

    86b2e5afec657a4524fb0807403d64fa

  • SHA1

    47434dfda77637d58bf89e9068a200a8c57f46b1

  • SHA256

    8a4bc3c07e092cff01adc4db11e1638425ce9659d1bc5ae7f2bf892786a25d71

  • SHA512

    2a511bd968ba121bc2fbf8fc5885d50c6e819c221c98093f40b4fc21741b721541e30cf552eb0fe60311bf6279e252955d4cdf7d9b85bd6c4834e28eab70686a

  • SSDEEP

    786432:AthwIlasS4HIka0h4qkcfwKL1CfkEdtgce:uO4HpMU1ge

Malware Config

Targets

    • Target

      Windscribe_2.10.15.exe

    • Size

      24.6MB

    • MD5

      86b2e5afec657a4524fb0807403d64fa

    • SHA1

      47434dfda77637d58bf89e9068a200a8c57f46b1

    • SHA256

      8a4bc3c07e092cff01adc4db11e1638425ce9659d1bc5ae7f2bf892786a25d71

    • SHA512

      2a511bd968ba121bc2fbf8fc5885d50c6e819c221c98093f40b4fc21741b721541e30cf552eb0fe60311bf6279e252955d4cdf7d9b85bd6c4834e28eab70686a

    • SSDEEP

      786432:AthwIlasS4HIka0h4qkcfwKL1CfkEdtgce:uO4HpMU1ge

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks