General

  • Target

    ProjectXPlayerLauncher.exe

  • Size

    1.2MB

  • Sample

    240914-xarwnaygml

  • MD5

    f91e7873fabec34bb4ef53aeeaa3d148

  • SHA1

    fd5bdf143a0e9ab4c96a242e07991b83b3d0c1cd

  • SHA256

    507fc6305f31f8f365ea37d26d2fb5bd729fc9f172f4bd9774e1419407151178

  • SHA512

    ef3105f5c59e9ebd47c0981eb7cc52e5e279e93a4c1b4cd957b6e2abe869842c04021cb722926dfd31d7ec1d9360b61bf2dce0d92690b0adac665edd35012907

  • SSDEEP

    12288:f03U8c2nE/XHw+/CTtQD+XS+o9bGGD1Fil12T0CHUJa:f03U8/Sd6TG+i+odGGqz2+Ja

Malware Config

Targets

    • Target

      ProjectXPlayerLauncher.exe

    • Size

      1.2MB

    • MD5

      f91e7873fabec34bb4ef53aeeaa3d148

    • SHA1

      fd5bdf143a0e9ab4c96a242e07991b83b3d0c1cd

    • SHA256

      507fc6305f31f8f365ea37d26d2fb5bd729fc9f172f4bd9774e1419407151178

    • SHA512

      ef3105f5c59e9ebd47c0981eb7cc52e5e279e93a4c1b4cd957b6e2abe869842c04021cb722926dfd31d7ec1d9360b61bf2dce0d92690b0adac665edd35012907

    • SSDEEP

      12288:f03U8c2nE/XHw+/CTtQD+XS+o9bGGD1Fil12T0CHUJa:f03U8/Sd6TG+i+odGGqz2+Ja

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks