General
-
Target
FinalMom.exe
-
Size
270KB
-
Sample
240725-zgvx1awgrh
-
MD5
4c048896f61c1fc598c9ec70adf6ee08
-
SHA1
fb5468fe0894a4a7728b1a388bc08963cc760118
-
SHA256
f213b6d73b6a7b3d90f4097e69689fa88fffe327690801ffb6992d659b981bf2
-
SHA512
33652027fe457dd967dad1367510db1fd0eede4415dd86b64aea9d77425e7e061b60577811e4c5e79a6cf17cba33faa52c1780934079ed527efeb7846b1dc75c
-
SSDEEP
6144:LGLRsWlWysINHL87yCwQx4Jw99aKGz5UBBkvVv+Iz3D5vxju7llbb9EE4N8cUMsG:LGLdlHL8W/QWJwiKluNmudUl99EE4N88
Static task
static1
Behavioral task
behavioral1
Sample
FinalMom.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
FinalMom.exe
Resource
win10v2004-20240704-en
Malware Config
Targets
-
-
Target
FinalMom.exe
-
Size
270KB
-
MD5
4c048896f61c1fc598c9ec70adf6ee08
-
SHA1
fb5468fe0894a4a7728b1a388bc08963cc760118
-
SHA256
f213b6d73b6a7b3d90f4097e69689fa88fffe327690801ffb6992d659b981bf2
-
SHA512
33652027fe457dd967dad1367510db1fd0eede4415dd86b64aea9d77425e7e061b60577811e4c5e79a6cf17cba33faa52c1780934079ed527efeb7846b1dc75c
-
SSDEEP
6144:LGLRsWlWysINHL87yCwQx4Jw99aKGz5UBBkvVv+Iz3D5vxju7llbb9EE4N8cUMsG:LGLdlHL8W/QWJwiKluNmudUl99EE4N88
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Indicator Removal: Clear Persistence
Clear artifacts associated with previously established persistence like scheduletasks on a host.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
1Clear Persistence
1Modify Registry
3Scripting
1