General

  • Target

    MEmu-setup-abroad-02bf66ec.exe

  • Size

    138.6MB

  • Sample

    240919-a72qssscjh

  • MD5

    34a6edb2d2f3c10f6194d6e5af1be4af

  • SHA1

    b04ff81ad6b854f099dab1e48bb1443f438c40f6

  • SHA256

    02bf66ec62011cb9b3274ff8558ff1a6afe2f5c3ece0ee96fa9fb52c5bf730a4

  • SHA512

    0c96d1f8f2b5628dd4189924654d627de2dea9ea00db69b0992cb356e68e93530815164448421e8adea3443aa1e0a5ff62449555d1127168fe1c363dd7edc027

  • SSDEEP

    3145728:y3u8Q+I+MeooQsFecPqn0talbB+2rfezkYb+WsqAJnWJA7PUq:ymEd/tahcweD4nsWUq

Malware Config

Targets

    • Target

      MEmu-setup-abroad-02bf66ec.exe

    • Size

      138.6MB

    • MD5

      34a6edb2d2f3c10f6194d6e5af1be4af

    • SHA1

      b04ff81ad6b854f099dab1e48bb1443f438c40f6

    • SHA256

      02bf66ec62011cb9b3274ff8558ff1a6afe2f5c3ece0ee96fa9fb52c5bf730a4

    • SHA512

      0c96d1f8f2b5628dd4189924654d627de2dea9ea00db69b0992cb356e68e93530815164448421e8adea3443aa1e0a5ff62449555d1127168fe1c363dd7edc027

    • SSDEEP

      3145728:y3u8Q+I+MeooQsFecPqn0talbB+2rfezkYb+WsqAJnWJA7PUq:ymEd/tahcweD4nsWUq

    • Cobalt Strike reflective loader

      Detects the reflective loader used by Cobalt Strike.

    • Cobaltstrike

      Detected malicious payload which is part of Cobaltstrike.

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Drops file in Drivers directory

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Downloads MZ/PE file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies powershell logging option

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks