General
-
Target
MuMuInstaller_3.1.6.0_yx-gl-codex_all_1709777287.exe
-
Size
5.3MB
-
Sample
240806-s1xglswgmf
-
MD5
86e0f88dcc69e631df6cfd28bb5babb1
-
SHA1
e7b3552cf10983c97bf3381fe66053f8f5a1ea9c
-
SHA256
baa175b6fa6ee27992d80995f9eae285f3a3eceb35b655c0c5a5f58b7ac748dc
-
SHA512
c2e0b76ea267cbe01019cd826c90ffcf84e88da1f16c83ae36cebe543cf75316b5a375a3f053165d4e8fe0b6d65a70558cb08693473d5710dc9de4a44fef7843
-
SSDEEP
98304:cevOCyjertpQj68ndGaX6tJJQv2FKA75OpVclc02vDRZTEW:pvOCyj2tpYo3u0jc02vVZoW
Static task
static1
Behavioral task
behavioral1
Sample
MuMuInstaller_3.1.6.0_yx-gl-codex_all_1709777287.exe
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
MuMuInstaller_3.1.6.0_yx-gl-codex_all_1709777287.exe
-
Size
5.3MB
-
MD5
86e0f88dcc69e631df6cfd28bb5babb1
-
SHA1
e7b3552cf10983c97bf3381fe66053f8f5a1ea9c
-
SHA256
baa175b6fa6ee27992d80995f9eae285f3a3eceb35b655c0c5a5f58b7ac748dc
-
SHA512
c2e0b76ea267cbe01019cd826c90ffcf84e88da1f16c83ae36cebe543cf75316b5a375a3f053165d4e8fe0b6d65a70558cb08693473d5710dc9de4a44fef7843
-
SSDEEP
98304:cevOCyjertpQj68ndGaX6tJJQv2FKA75OpVclc02vDRZTEW:pvOCyj2tpYo3u0jc02vVZoW
-
Creates new service(s)
-
Downloads MZ/PE file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1