General

  • Target

    zoomLive.zip

  • Size

    3.7MB

  • Sample

    240812-fst1aswhqn

  • MD5

    dfe8ee7853f96dfac9291c25a5734867

  • SHA1

    fd377e62e154204860ed5335b3cec981beea07f1

  • SHA256

    92a6fd7de94ba8032291a2304c80595df03929b29f01a74e8fe163ec97df6a42

  • SHA512

    c0c3d7cf44c6d66aefb135aa14684564de516df99f2d1c6246e880f2fe0552563aa7498a2ba68686526f587454c2cc05d1d9ddbf2e68ca7485b09413d218359e

  • SSDEEP

    98304:cvnAq9lFkB0GXrtZXsH+EH3/0ZCEfyVLFXXptIt679LwsqzldV5Uk:cvAPBltlo+EX/KCxZStkLvqZT

Malware Config

Targets

    • Target

      4e81851729d58f321bb83bdb03200f62bc5ee56e0703b2d609a3923a033d5b53

    • Size

      5.2MB

    • MD5

      0ed9b8e9f9b85a6af4946510f9299ff5

    • SHA1

      51496e2d591117c094e163985b274e6ef947044c

    • SHA256

      4e81851729d58f321bb83bdb03200f62bc5ee56e0703b2d609a3923a033d5b53

    • SHA512

      1885905a2e1b0f47dedce304e219f629336c42e952c0d9f83eda1111e36ad1d882919465c9be397154c9ac39cc60d3190ce04121d3479840ee7c0b2e11654a9e

    • SSDEEP

      98304:5ps6efPfBOPvLtabi4X0MV+dYdcGt7VIb4:zfefPJws3V+a

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks