General
-
Target
Epson Stylus CX7300.rar
-
Size
590KB
-
Sample
240807-keafysyena
-
MD5
c946605f8e5be948cf65973eefc81171
-
SHA1
28ce778b1e4391ef26dc156960f46c3e39b703c4
-
SHA256
69ff1b78ee85f0d76c571067a5c3732d880af586efb3c0b6d86b46ac70c37521
-
SHA512
2bd075f226ed870a6179b75500de84f20db7ee7018999bd8ac391f81884ad0e7ce1f7987a7d7bd042eb65ade87f9087961f782062d763c333c7d019d52a1958f
-
SSDEEP
12288:L/6BmFBlIxwWdkm7DzlwgxBa+su+wXYLZF06eUwQjAV01aVa9Q4QNavRDMLj:OBmFBexwpeDzlwGBa+hX0ZF3AQjAV010
Static task
static1
Behavioral task
behavioral1
Sample
Epson Stylus CX7300.rar
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
Epson Stylus CX7300.rar
-
Size
590KB
-
MD5
c946605f8e5be948cf65973eefc81171
-
SHA1
28ce778b1e4391ef26dc156960f46c3e39b703c4
-
SHA256
69ff1b78ee85f0d76c571067a5c3732d880af586efb3c0b6d86b46ac70c37521
-
SHA512
2bd075f226ed870a6179b75500de84f20db7ee7018999bd8ac391f81884ad0e7ce1f7987a7d7bd042eb65ade87f9087961f782062d763c333c7d019d52a1958f
-
SSDEEP
12288:L/6BmFBlIxwWdkm7DzlwgxBa+su+wXYLZF06eUwQjAV01aVa9Q4QNavRDMLj:OBmFBexwpeDzlwGBa+hX0ZF3AQjAV010
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-