Resubmissions

21/07/2024, 01:06

240721-bf79yatflk 3

21/07/2024, 00:53

240721-a8wk6stekq 8

General

  • Target

    Play Roblox.lnk

  • Size

    1KB

  • Sample

    240721-a8wk6stekq

  • MD5

    42b2befac7c458456d02f4b6f8257195

  • SHA1

    70bdbdfb12e6f33088dbe71abd304b0b031f93e5

  • SHA256

    31d1c9605ffb94c6d9684d0abf7a4740d532b82676ec0b9479efea3d34ed6a41

  • SHA512

    b1bd683e1753d69e8acfa1f4e29926a2319f552f3391887faeaf5afeaab8350eefcaac927d9b66c9752c0f8ff1894294c2fa0dec941bac2ce26d026847b1a4d8

Malware Config

Targets

    • Target

      Play Roblox.lnk

    • Size

      1KB

    • MD5

      42b2befac7c458456d02f4b6f8257195

    • SHA1

      70bdbdfb12e6f33088dbe71abd304b0b031f93e5

    • SHA256

      31d1c9605ffb94c6d9684d0abf7a4740d532b82676ec0b9479efea3d34ed6a41

    • SHA512

      b1bd683e1753d69e8acfa1f4e29926a2319f552f3391887faeaf5afeaab8350eefcaac927d9b66c9752c0f8ff1894294c2fa0dec941bac2ce26d026847b1a4d8

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks