Resubmissions

25-08-2024 00:52

240825-a8anpsyhra 7

General

  • Target

    Loader.rar

  • Size

    17.8MB

  • Sample

    240825-a8anpsyhra

  • MD5

    ac733df5c243df5d68d25dfa21bd6801

  • SHA1

    85fd12b5bc5273c8279f55a885c7720b37570356

  • SHA256

    efa311b86c4458bc6adfc1c84403b9336ab288e674712ca792289454e27f1069

  • SHA512

    97f155af86b328ee197aa9d41079139cf26ad7e8f5d7c45afce094322acb520dc56942d4db1ab4f8548a2c5d9ff6c12f7751901a4125197137dffbde592b8847

  • SSDEEP

    393216:luQ/HLQCePDnRl/bTGy4Ec+YtxBgexLgN/GJ2YZiprk09qRq7j+:DvEj7z354EFYtUexLgN/AZiph997i

Malware Config

Targets

    • Target

      Loader.exe

    • Size

      18.0MB

    • MD5

      5c2d29c37fc384670c0f21033bc228bf

    • SHA1

      cb173bec24298e0f6780d53a6e0b5da1c89b3959

    • SHA256

      3a1a86e269c81ec54aaa744c37151b20e910cc261f88e9cde1b4bf4e8c05fbe1

    • SHA512

      8ef493758523d57d60665f83e6b943e372790dc8991fb1ef0da0ebf6b579cfcd1bb62dfcde34c582c9df5028a3f4eb35a10327a8b2d5e8f9f8fd12093728b047

    • SSDEEP

      393216:Iw477tmd6/Kyo3SYpThhUu/GlKpHXy/HnnDYo3ndeU:Ip77t81yo3NhWOXy/HDn

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks