General

  • Target

    Spongebob.exe

  • Size

    85.4MB

  • Sample

    240908-sern8svdkg

  • MD5

    af8070ee0046a23885f5858b08dd7b53

  • SHA1

    a4319bf07e783a9a60c9be762888297e7942408f

  • SHA256

    00a015c9192eb8be40d364f3fd9f737045621f28845a53a0ffa93c371cffe897

  • SHA512

    8d5b75c619e3008fed9fbc84392fa8a778b48bcf2eabdcc46f74ecea003a4f12ddd6172f4a0afbe0e24e10195950021fc33b17002895a6018d7f04b05490bbe2

  • SSDEEP

    1572864:q370Hc4DhPeSIfntvXSj2VKoYODzcVJNcl9JowQ6dZIK14meuCwe:woHcMJIftzrYOPcVslkf6IKWmRI

Malware Config

Targets

    • Target

      Spongebob.exe

    • Size

      85.4MB

    • MD5

      af8070ee0046a23885f5858b08dd7b53

    • SHA1

      a4319bf07e783a9a60c9be762888297e7942408f

    • SHA256

      00a015c9192eb8be40d364f3fd9f737045621f28845a53a0ffa93c371cffe897

    • SHA512

      8d5b75c619e3008fed9fbc84392fa8a778b48bcf2eabdcc46f74ecea003a4f12ddd6172f4a0afbe0e24e10195950021fc33b17002895a6018d7f04b05490bbe2

    • SSDEEP

      1572864:q370Hc4DhPeSIfntvXSj2VKoYODzcVJNcl9JowQ6dZIK14meuCwe:woHcMJIftzrYOPcVslkf6IKWmRI

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks