General

  • Target

    iTunes64Setup.exe

  • Size

    201.5MB

  • Sample

    240803-cfcnpszanl

  • MD5

    e4a3fa3ea8f46095b47e99c1c8061e1e

  • SHA1

    baf74bef46c2888245fb4fcfe143a392938a9e72

  • SHA256

    9cbaef01a8e2be6f4aa68768484268def7ca71491b71e56b435d4878da3232fd

  • SHA512

    7a9f687b9888ab2388d8f637dc290b124b9b5f89213f2d671c00e8205372bf45cf5ac2422e032d7f29b7f12dd54f18707a6ea71059a6cef8c2d2470a33c749d6

  • SSDEEP

    6291456:TR7zjHZOvPBz6kRVBHPh7d+ktvxSOeM46:dlOvPQ8VBHPh7cktvxSOeM46

Malware Config

Targets

    • Target

      iTunes64Setup.exe

    • Size

      201.5MB

    • MD5

      e4a3fa3ea8f46095b47e99c1c8061e1e

    • SHA1

      baf74bef46c2888245fb4fcfe143a392938a9e72

    • SHA256

      9cbaef01a8e2be6f4aa68768484268def7ca71491b71e56b435d4878da3232fd

    • SHA512

      7a9f687b9888ab2388d8f637dc290b124b9b5f89213f2d671c00e8205372bf45cf5ac2422e032d7f29b7f12dd54f18707a6ea71059a6cef8c2d2470a33c749d6

    • SSDEEP

      6291456:TR7zjHZOvPBz6kRVBHPh7d+ktvxSOeM46:dlOvPQ8VBHPh7cktvxSOeM46

    • Modifies firewall policy service

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks