General
-
Target
Soundpad-fhtat.zip
-
Size
22.0MB
-
Sample
240920-288dhstfln
-
MD5
c362ff26989175e665b90a200ea7a073
-
SHA1
42b7ac3317c3c4299c440844ca65a832dad5cbf1
-
SHA256
5710b0ec5dd8e10b78034a2568b2a1aa22d2edf89fd40650d94b30512551cab4
-
SHA512
d834ce1234533fbe9a857a385d66faa47a0511f3ee95c90f21cf7b12aaa7f654ed1ddcb736092185d3da0d1834cd6571f2e22702aa9858e234fd14d8b31b7a8b
-
SSDEEP
393216:2erSwAVE3XsRMiJpsB9SMe2+8rFJ295pTH1jhI2DQ2:2erhzns7AB0N2Trkp71tXDQ2
Behavioral task
behavioral1
Sample
Soundpad-Crack-fhtat.xyz/Soundpad.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Soundpad-Crack-fhtat.xyz/UniteFxControl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Soundpad-Crack-fhtat.xyz/UniteFxUpdate.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
Soundpad-Crack-fhtat.xyz/steam_api64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Soundpad_x64-3.3.2.msi
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Soundpad-Crack-fhtat.xyz/Soundpad.exe
-
Size
10.9MB
-
MD5
0ae4f60d72e0d1c159505500b8a08ebb
-
SHA1
bb352dafd3c3ebebb4414b799010fe5ebddbef44
-
SHA256
ed3371229647ef876b45cb5940e48b461df58d4e68ad4932f5877eba90c8d379
-
SHA512
88495911df544a04a4e09828ae10b57d3d945c41d6e28964c2d4d077afa43fec1c82a8ff6dcce57a3c7b9e5d02d1e47f800f557b022866f5f7be4a2db9b07536
-
SSDEEP
196608:fDRlger67uOemwy1LR/XU3gmsRM0wWM+wC89ooEvu:UerSwAVE3XsRMiJpsf
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Loads dropped DLL
-
Drops file in System32 directory
-
-
-
Target
Soundpad-Crack-fhtat.xyz/UniteFxControl.dll
-
Size
1.1MB
-
MD5
6ac19cffc0c58ce35ae704c381c4f702
-
SHA1
c43900c5d56d62311a337b04c9489afc1c75c175
-
SHA256
afe6075ea7dd1bdcbc47b38385216d11cdd5ebc3f82eeedfa6d766e9249d6252
-
SHA512
61197228b9a1bb9810c68cc04928fd47e2bbe78d36f71c4a2ee498742fea8fd6c950cf43578fa20c6009f1ed6343bf8ca7bfb155512018aac88a4191fad4f939
-
SSDEEP
24576:XBLW5gqPvbSfiCRcXw0qU6RmWByuAy5a/owH/1:ZqPvbv/Zwm4yi5aQwHN
Score1/10 -
-
-
Target
Soundpad-Crack-fhtat.xyz/UniteFxUpdate.dll
-
Size
442KB
-
MD5
0ee743073ee6b68f8222be2661d95315
-
SHA1
2e642772ec19edf73422fe25a8d45db1a006ff85
-
SHA256
562b17370c7283e92a3353b76ab2aefd301c2e78782fa60ec9ee35676ad44f96
-
SHA512
c3f2037bd37cef7978187f67f1d0633ee3067b4837e0ad9ae2a5c8efab8ec4ce6a14c1d88e200ffaa8677f74fd5995789297e6a7b5ac18d19dc9d53b4d9170ba
-
SSDEEP
6144:12UHPCFzuxTmVCp41NpA9+2pVbW+i6kdIkl7haKGrgEOHWeohg6yKJIGFEph:12NzSC1Na42ekuMs2eoqO+Dh
Score1/10 -
-
-
Target
Soundpad-Crack-fhtat.xyz/steam_api64.dll
-
Size
3.4MB
-
MD5
fde6c8bf079648ef175bfe54a48c33bd
-
SHA1
86da9176866a1f03ca8ad7fd381c3f2cfc89c6e8
-
SHA256
0a1e5c53cbad6b21de61e11f023c0d3f11f698164c743bd272741a7ba59ca5d7
-
SHA512
d750550d1abe01f8b59623e58dd366d3baa6b0a03a48f0c95f381d30481ffd20549801979c3c9d19145521a0f3dd8dbd6397347ec4d3448ab1ef4ad8e781a1ab
-
SSDEEP
49152:sqg1gpl5AKwKsRtf1Mx5k1aGLCnAWWMWWAwK3TQz4Cq9NVF14ZlEk8gtCbC5qAmk:GUnZ/slM7k/2DaWNcCaEk8oMexLCFJ
Score7/10 -
-
-
Target
Soundpad_x64-3.3.2.msi
-
Size
6.6MB
-
MD5
afb6e3c6774d7be5e9f83fa9c7e5955b
-
SHA1
de1083dfe98a4560dff51c8f5a23390256d689cd
-
SHA256
41d2b8a6c4474e1b9639b4fa05fcbde7cd9bbea268f43dd84fa5f95cafa49022
-
SHA512
91c87e591e266b1ba46958b146aedc2a30a7d7c5288d5780ac87e02fdf0c8f1327ec97042c09780dc861cb48f91a35afb547d74154b71ba753c10d77c526140e
-
SSDEEP
98304:VoOP1lgYAWntNrNTx4hz6e60goXD2zhKO2IDPII326rEjfZHFUO8E7dS:Vp+YhtNJCgLm2zkk0IrrSfZHidE7d
Score6/10-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Component Object Model Hijacking
1Installer Packages
1Privilege Escalation
Event Triggered Execution
2Component Object Model Hijacking
1Installer Packages
1