General

  • Target

    Autoclicker_2.0.0_x86_en-US.msi

  • Size

    3.7MB

  • Sample

    240814-qsgp3szblj

  • MD5

    3231ca7759e7949c7f028b35e1c5b804

  • SHA1

    77039469545996f7c766489fb3757ced80aec102

  • SHA256

    a11a6e5a4339a120f1c9e6b5c9c7c702da254139dcb5e856809b7959086f011e

  • SHA512

    fdd0ecfde68a83dc5296180935d35d649662d736d8b8c48352901d06ac80cab2e0d08dd62db95526ac3f72fc83188b3231e8a7a289c6e9e9f7a03ae954b4dd5a

  • SSDEEP

    98304:ttiYSDgI7C/9s11mvbx4nVTMHKo8ABlmcKWdWwv8m:ttPI7C/CLmvCVTMwAf1fI

Malware Config

Targets

    • Target

      Autoclicker_2.0.0_x86_en-US.msi

    • Size

      3.7MB

    • MD5

      3231ca7759e7949c7f028b35e1c5b804

    • SHA1

      77039469545996f7c766489fb3757ced80aec102

    • SHA256

      a11a6e5a4339a120f1c9e6b5c9c7c702da254139dcb5e856809b7959086f011e

    • SHA512

      fdd0ecfde68a83dc5296180935d35d649662d736d8b8c48352901d06ac80cab2e0d08dd62db95526ac3f72fc83188b3231e8a7a289c6e9e9f7a03ae954b4dd5a

    • SSDEEP

      98304:ttiYSDgI7C/9s11mvbx4nVTMHKo8ABlmcKWdWwv8m:ttPI7C/CLmvCVTMwAf1fI

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Downloads MZ/PE file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks