General

  • Target

    4808c357a28c46069aa76819a383fa03d4083307ca116e516883fcc46b8f5212

  • Size

    3.5MB

  • Sample

    240807-z89kgaxgqc

  • MD5

    9ec0d6b157cad4cb24a73c5fe25f5741

  • SHA1

    96f6fca560d26c8f8706a407a03e7ce414caa67c

  • SHA256

    4808c357a28c46069aa76819a383fa03d4083307ca116e516883fcc46b8f5212

  • SHA512

    7402732e6ac7dce6ae91f03a63c621d24e5263fa3c65d69aae1e6adb868dacba36082ee4d6d0fea37a31f2875b4c2eb7456cb1c7ba8f93d3668cad46f2ce05b6

  • SSDEEP

    98304:KybQ5fkA+XPwPaIL0Kn3xBqFhimSIACifrxFLOAkGkzdnEVomFHKnPsH:3QEXP7smSIACiDxFLOyomFHKnPsH

Malware Config

Targets

    • Target

      4808c357a28c46069aa76819a383fa03d4083307ca116e516883fcc46b8f5212

    • Size

      3.5MB

    • MD5

      9ec0d6b157cad4cb24a73c5fe25f5741

    • SHA1

      96f6fca560d26c8f8706a407a03e7ce414caa67c

    • SHA256

      4808c357a28c46069aa76819a383fa03d4083307ca116e516883fcc46b8f5212

    • SHA512

      7402732e6ac7dce6ae91f03a63c621d24e5263fa3c65d69aae1e6adb868dacba36082ee4d6d0fea37a31f2875b4c2eb7456cb1c7ba8f93d3668cad46f2ce05b6

    • SSDEEP

      98304:KybQ5fkA+XPwPaIL0Kn3xBqFhimSIACifrxFLOAkGkzdnEVomFHKnPsH:3QEXP7smSIACiDxFLOyomFHKnPsH

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks