General

  • Target

    file

  • Size

    312KB

  • Sample

    240903-q3e91azbmg

  • MD5

    7e06b38157b8ab52ee8ec38fb0a74f0e

  • SHA1

    b572d57cecd8eb4e04dff4035f6fe30aea0bf300

  • SHA256

    32a7b1f12edcae2c85a6954ff69b6c3261023d2af510fbaf0f346c87c3b8e9ee

  • SHA512

    0b49035a573f40f6da87518c1f40febcfb6af303d3f6e2f6137a59837487ef10919023299d31455c8ee9c758ed3847abb662ce6df7b48c8c68dc2b65c0dfe23b

  • SSDEEP

    3072:xiYgAkHnjPIQ6KSfc/OH5PaW+LN7DxRLlzglKUVv9k:DgAkHnjPIQBSfVZPCN7jBUVv9k

Malware Config

Targets

    • Target

      file

    • Size

      312KB

    • MD5

      7e06b38157b8ab52ee8ec38fb0a74f0e

    • SHA1

      b572d57cecd8eb4e04dff4035f6fe30aea0bf300

    • SHA256

      32a7b1f12edcae2c85a6954ff69b6c3261023d2af510fbaf0f346c87c3b8e9ee

    • SHA512

      0b49035a573f40f6da87518c1f40febcfb6af303d3f6e2f6137a59837487ef10919023299d31455c8ee9c758ed3847abb662ce6df7b48c8c68dc2b65c0dfe23b

    • SSDEEP

      3072:xiYgAkHnjPIQ6KSfc/OH5PaW+LN7DxRLlzglKUVv9k:DgAkHnjPIQBSfVZPCN7jBUVv9k

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks