General
-
Target
bin.zip
-
Size
6.2MB
-
Sample
240809-z39chszalp
-
MD5
5743521f038a51b35891c1c0bb11650e
-
SHA1
b45ace1ae6d4ac40afc49ddfcc24fd78775d7824
-
SHA256
02e713808860173bf56e5022f7adeae52ee7381d6e4f1cb61a72dfc6101168a2
-
SHA512
82867a6771f9ebb71b4d61730739f99af854230737900f22ce632e93b88ca0eef5d06776ce7d1713ea4ffc1752e7608d7b93743adc316b5c143ef8eee98fe896
-
SSDEEP
196608:U6zwS7Rk2WPgoc+2QR3KWQEAzYoUkzcwCwNwI:Jlk23qpxVEwkewN5
Static task
static1
Behavioral task
behavioral1
Sample
NX.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
NXInjector.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
NX.dll
-
Size
1.5MB
-
MD5
26830be9abb1a7edbf2ac07322987609
-
SHA1
c31a37dbc6ddb32f682c3702fd4341ab301b8d60
-
SHA256
7d466cb0e1c149bfb60a01449f507a6366d0b571965561240dd0b85662182942
-
SHA512
42db473eeb6f13575e2a486a4b185fcee9272d4181e3bff337f4d1fa47c0c19b16ba87ad00d387bbea6145c83bf663e730f22731cf6d7637a2d9421c2f37bc8c
-
SSDEEP
24576:TbX1SFIzNpu4D0mZ3flVPvB7mOPaTL0dqHXiB/z5ZxQCzIdJMtPePA5L0V:TbX1SyzNpu4omZ3fvXdmOPaT8J3PQCkg
Score1/10 -
-
-
Target
NXInjector.exe
-
Size
14.7MB
-
MD5
8e652b033b4859c30cbda858590a9a09
-
SHA1
bc7c49b3361a41f4e3331cbc03b98bb5b9294a2d
-
SHA256
b028c463c223dac6dd12c218db74aa82442a5ea244798db3edf535f4ddb8038c
-
SHA512
087c8e2dc8f650f394add98fff21335ed180f6eb231694475bf04bbbfd3f25d28570add92bd3d042309b45238961b8ca349387de7517defbf9418c2d5a33b711
-
SSDEEP
98304:wfbNH4ZF0GYr4PN2uSLfanFY12CbB75g5E9d2Q04JRfwesl18:0U/YryNDK0+B39Y8RIdl1
Score8/10-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1