Resubmissions

13/09/2024, 03:42

240913-d9hx9asdkp 6

General

  • Target

    4kvideodownloaderplus_1.9.0_x64_online.exe

  • Size

    812KB

  • Sample

    240913-d9hx9asdkp

  • MD5

    99c8485827f8a32937cc3eabe3b6f112

  • SHA1

    18b55fc22e635d3f6e4ede3d29bb20ecaf9e7183

  • SHA256

    806f11731d2d43612ff711427f7a3c2272117ff0f656c5ee9f85a35e5e6cb970

  • SHA512

    c1bdb28c0c69afe5786e55e03ccf0b2302466545bf3ceaaf226c6206e92cba2d90df5dd49f2dc5569b50c33f28db7ca4b8744129e3d3e8872f9771c1b37c5637

  • SSDEEP

    24576:7NsfiTdYSuVzZH9tH1v1Jb8RuFEMpALfIS87D7z:7T2pZ1JjeLASO

Malware Config

Targets

    • Target

      4kvideodownloaderplus_1.9.0_x64_online.exe

    • Size

      812KB

    • MD5

      99c8485827f8a32937cc3eabe3b6f112

    • SHA1

      18b55fc22e635d3f6e4ede3d29bb20ecaf9e7183

    • SHA256

      806f11731d2d43612ff711427f7a3c2272117ff0f656c5ee9f85a35e5e6cb970

    • SHA512

      c1bdb28c0c69afe5786e55e03ccf0b2302466545bf3ceaaf226c6206e92cba2d90df5dd49f2dc5569b50c33f28db7ca4b8744129e3d3e8872f9771c1b37c5637

    • SSDEEP

      24576:7NsfiTdYSuVzZH9tH1v1Jb8RuFEMpALfIS87D7z:7T2pZ1JjeLASO

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks