Resubmissions

05/10/2024, 23:09

241005-246zwswalr 8

05/10/2024, 22:45

241005-2pwklszcpg 8

27/08/2024, 00:06

240827-adw88avamp 8

27/08/2024, 00:02

240827-abew6athkq 8

General

  • Target

    Bloxstrap-v2.7.0.exe

  • Size

    10.1MB

  • Sample

    240827-abew6athkq

  • MD5

    2c752edef5b0aa0962a3e01c4c82a2fa

  • SHA1

    9c3afd1c63f2b0dbdc2dc487709471222d2cb81e

  • SHA256

    891846bf656253ca1cdd28584a28681e9604e2a03d74cd6b99313e3bff11daf8

  • SHA512

    04d25fe7d40c8c320ffc545a038ad6ea458df6a8a552b0e0393b369a03b9bf273c72f30169bd54e8eb10757c04bdddf3859c601c1eb9e1a12fe4d15658906dfe

  • SSDEEP

    98304:TYd5DQd5Dk9Tsed5DogTrBKvGWD3nIOYoHwfLk3vSmaR0+Mc4AN0edaAHDfysrT4:Tasx3vG6IObAbN0T

Malware Config

Targets

    • Target

      Bloxstrap-v2.7.0.exe

    • Size

      10.1MB

    • MD5

      2c752edef5b0aa0962a3e01c4c82a2fa

    • SHA1

      9c3afd1c63f2b0dbdc2dc487709471222d2cb81e

    • SHA256

      891846bf656253ca1cdd28584a28681e9604e2a03d74cd6b99313e3bff11daf8

    • SHA512

      04d25fe7d40c8c320ffc545a038ad6ea458df6a8a552b0e0393b369a03b9bf273c72f30169bd54e8eb10757c04bdddf3859c601c1eb9e1a12fe4d15658906dfe

    • SSDEEP

      98304:TYd5DQd5Dk9Tsed5DogTrBKvGWD3nIOYoHwfLk3vSmaR0+Mc4AN0edaAHDfysrT4:Tasx3vG6IObAbN0T

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks