Resubmissions
25-08-2024 00:52
240825-a8anpsyhra 7General
-
Target
Loader.rar
-
Size
17.8MB
-
Sample
240825-a8anpsyhra
-
MD5
ac733df5c243df5d68d25dfa21bd6801
-
SHA1
85fd12b5bc5273c8279f55a885c7720b37570356
-
SHA256
efa311b86c4458bc6adfc1c84403b9336ab288e674712ca792289454e27f1069
-
SHA512
97f155af86b328ee197aa9d41079139cf26ad7e8f5d7c45afce094322acb520dc56942d4db1ab4f8548a2c5d9ff6c12f7751901a4125197137dffbde592b8847
-
SSDEEP
393216:luQ/HLQCePDnRl/bTGy4Ec+YtxBgexLgN/GJ2YZiprk09qRq7j+:DvEj7z354EFYtUexLgN/AZiph997i
Static task
static1
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Loader.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Loader.exe
-
Size
18.0MB
-
MD5
5c2d29c37fc384670c0f21033bc228bf
-
SHA1
cb173bec24298e0f6780d53a6e0b5da1c89b3959
-
SHA256
3a1a86e269c81ec54aaa744c37151b20e910cc261f88e9cde1b4bf4e8c05fbe1
-
SHA512
8ef493758523d57d60665f83e6b943e372790dc8991fb1ef0da0ebf6b579cfcd1bb62dfcde34c582c9df5028a3f4eb35a10327a8b2d5e8f9f8fd12093728b047
-
SSDEEP
393216:Iw477tmd6/Kyo3SYpThhUu/GlKpHXy/HnnDYo3ndeU:Ip77t81yo3NhWOXy/HDn
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1