General

  • Target

    2024-08-21_1e9df2bd457c9869abd448f0dad1a9e7_hijackloader_jeefo_magniber

  • Size

    5.9MB

  • Sample

    240821-rrn87swhlk

  • MD5

    1e9df2bd457c9869abd448f0dad1a9e7

  • SHA1

    8103b58ae4d79c198b1901e5ae6e0f80d764bdad

  • SHA256

    163ccb65f2e94acece11bdd72bdcd16350eff70f530b4fedef02645cf50fb732

  • SHA512

    2342342e59249a2e6a7a207ec6ec04c1c1eb1fbe527fd9ac439ea9ef7b5eaa58b8e0dedc09ce309ed52e316b825e31c7b76eb5643d1335fc4e300036f30b4191

  • SSDEEP

    98304:eu4h/CewR9wCB+Sdu6voX0C3nVxxI+B6gggNJ8/FavpREX8ISXB0CQf:ejtYR9wPNX0QZI+agNBpRUSR0CQf

Malware Config

Targets

    • Target

      2024-08-21_1e9df2bd457c9869abd448f0dad1a9e7_hijackloader_jeefo_magniber

    • Size

      5.9MB

    • MD5

      1e9df2bd457c9869abd448f0dad1a9e7

    • SHA1

      8103b58ae4d79c198b1901e5ae6e0f80d764bdad

    • SHA256

      163ccb65f2e94acece11bdd72bdcd16350eff70f530b4fedef02645cf50fb732

    • SHA512

      2342342e59249a2e6a7a207ec6ec04c1c1eb1fbe527fd9ac439ea9ef7b5eaa58b8e0dedc09ce309ed52e316b825e31c7b76eb5643d1335fc4e300036f30b4191

    • SSDEEP

      98304:eu4h/CewR9wCB+Sdu6voX0C3nVxxI+B6gggNJ8/FavpREX8ISXB0CQf:ejtYR9wPNX0QZI+agNBpRUSR0CQf

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks