General

  • Target

    survivalfriendly_npcs-1.0.1.jar

  • Size

    24KB

  • Sample

    240727-vxethazejn

  • MD5

    a429fd9146e4194e9725df1e6f85de4d

  • SHA1

    1e3ae9969888296b11a372d15cc91e3c9747c76c

  • SHA256

    3eb4be5f6ac0e8ecbc0625e3904827568ec32a8301f093df059a4e64a9fece71

  • SHA512

    3d82fe74b9e924bc67da6873382da6e52b30d798d9f71fc4d3f75d39b264e33bbfcbf15c4691ee1fdeaf735d1cc80747065a0e6b160cca144b41d164ad73133b

  • SSDEEP

    384:Gn+p7tlEaHR8WmyZDejxkh3lve0K6n+NSwfZFttU8omAiahLvO5AdAa:Gnu7ty67BVe0K6YSwztZ5AiovO5yr

Malware Config

Targets

    • Target

      survivalfriendly_npcs-1.0.1.jar

    • Size

      24KB

    • MD5

      a429fd9146e4194e9725df1e6f85de4d

    • SHA1

      1e3ae9969888296b11a372d15cc91e3c9747c76c

    • SHA256

      3eb4be5f6ac0e8ecbc0625e3904827568ec32a8301f093df059a4e64a9fece71

    • SHA512

      3d82fe74b9e924bc67da6873382da6e52b30d798d9f71fc4d3f75d39b264e33bbfcbf15c4691ee1fdeaf735d1cc80747065a0e6b160cca144b41d164ad73133b

    • SSDEEP

      384:Gn+p7tlEaHR8WmyZDejxkh3lve0K6n+NSwfZFttU8omAiahLvO5AdAa:Gnu7ty67BVe0K6YSwztZ5AiovO5yr

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks