General

  • Target

    Vio-V-Install.exe

  • Size

    1.8MB

  • Sample

    240803-rx6qfawekj

  • MD5

    c751eb55a63d451852a917c7d7707b60

  • SHA1

    46bb075ff3475ef9d30a3ab4ec25dcf7f68f1aee

  • SHA256

    93c1a708188af5f080d9692e8250f227cabe4db54d2739a69c11822e29fbba09

  • SHA512

    9304b2840b264388c9735afe4287edd5eaceb0a6cda46366749e33b28ca52d3af145a5032c8ff8069e8f8fa25aaf9aa4fa1d416a9a8aa9c8545d9e0964494143

  • SSDEEP

    24576:n4nXubIQGyxbPV0db26YcdsRtxZ12tM8oTIeMQBIR4NpnKMtuWLvwy:nqe3f6Mxtv1v8oM0BIR47KJWLvw

Malware Config

Targets

    • Target

      Vio-V-Install.exe

    • Size

      1.8MB

    • MD5

      c751eb55a63d451852a917c7d7707b60

    • SHA1

      46bb075ff3475ef9d30a3ab4ec25dcf7f68f1aee

    • SHA256

      93c1a708188af5f080d9692e8250f227cabe4db54d2739a69c11822e29fbba09

    • SHA512

      9304b2840b264388c9735afe4287edd5eaceb0a6cda46366749e33b28ca52d3af145a5032c8ff8069e8f8fa25aaf9aa4fa1d416a9a8aa9c8545d9e0964494143

    • SSDEEP

      24576:n4nXubIQGyxbPV0db26YcdsRtxZ12tM8oTIeMQBIR4NpnKMtuWLvwy:nqe3f6Mxtv1v8oM0BIR47KJWLvw

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks