General

  • Target

    Hack Regular Nerd Font Complete Mono Windows Compatible.ttf

  • Size

    1.2MB

  • Sample

    240824-t3tn6s1ckm

  • MD5

    fd12c93bba2bd4a7b9eb021c608a8182

  • SHA1

    1ce12e49a22a441fbd7b0304220f788c48a40df1

  • SHA256

    23bc63dbd4c2ceace969a91129098b1054717dace03c51e7e60788b5bba384f8

  • SHA512

    e69bed2f2429baf31e0ba8ae07770367aef79af4ae2538cfa111768a7c477a1d6b5e27d237bd220a86d8f667267e7c5a2a16f1632a9d6e213550c9724da181b5

  • SSDEEP

    24576:UzAayvLjBeFHljdjPL6t7yHxa1VrBloxOQEsQA8:ZvL4pjPTxsV+a/

Malware Config

Targets

    • Target

      Hack Regular Nerd Font Complete Mono Windows Compatible.ttf

    • Size

      1.2MB

    • MD5

      fd12c93bba2bd4a7b9eb021c608a8182

    • SHA1

      1ce12e49a22a441fbd7b0304220f788c48a40df1

    • SHA256

      23bc63dbd4c2ceace969a91129098b1054717dace03c51e7e60788b5bba384f8

    • SHA512

      e69bed2f2429baf31e0ba8ae07770367aef79af4ae2538cfa111768a7c477a1d6b5e27d237bd220a86d8f667267e7c5a2a16f1632a9d6e213550c9724da181b5

    • SSDEEP

      24576:UzAayvLjBeFHljdjPL6t7yHxa1VrBloxOQEsQA8:ZvL4pjPTxsV+a/

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Indicator Removal: Clear Windows Event Logs

      Clear Windows Event Logs to hide the activity of an intrusion.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks