General

  • Target

    Soundpad-fhtat.zip

  • Size

    22.0MB

  • Sample

    240920-288dhstfln

  • MD5

    c362ff26989175e665b90a200ea7a073

  • SHA1

    42b7ac3317c3c4299c440844ca65a832dad5cbf1

  • SHA256

    5710b0ec5dd8e10b78034a2568b2a1aa22d2edf89fd40650d94b30512551cab4

  • SHA512

    d834ce1234533fbe9a857a385d66faa47a0511f3ee95c90f21cf7b12aaa7f654ed1ddcb736092185d3da0d1834cd6571f2e22702aa9858e234fd14d8b31b7a8b

  • SSDEEP

    393216:2erSwAVE3XsRMiJpsB9SMe2+8rFJ295pTH1jhI2DQ2:2erhzns7AB0N2Trkp71tXDQ2

Malware Config

Targets

    • Target

      Soundpad-Crack-fhtat.xyz/Soundpad.exe

    • Size

      10.9MB

    • MD5

      0ae4f60d72e0d1c159505500b8a08ebb

    • SHA1

      bb352dafd3c3ebebb4414b799010fe5ebddbef44

    • SHA256

      ed3371229647ef876b45cb5940e48b461df58d4e68ad4932f5877eba90c8d379

    • SHA512

      88495911df544a04a4e09828ae10b57d3d945c41d6e28964c2d4d077afa43fec1c82a8ff6dcce57a3c7b9e5d02d1e47f800f557b022866f5f7be4a2db9b07536

    • SSDEEP

      196608:fDRlger67uOemwy1LR/XU3gmsRM0wWM+wC89ooEvu:UerSwAVE3XsRMiJpsf

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Target

      Soundpad-Crack-fhtat.xyz/UniteFxControl.dll

    • Size

      1.1MB

    • MD5

      6ac19cffc0c58ce35ae704c381c4f702

    • SHA1

      c43900c5d56d62311a337b04c9489afc1c75c175

    • SHA256

      afe6075ea7dd1bdcbc47b38385216d11cdd5ebc3f82eeedfa6d766e9249d6252

    • SHA512

      61197228b9a1bb9810c68cc04928fd47e2bbe78d36f71c4a2ee498742fea8fd6c950cf43578fa20c6009f1ed6343bf8ca7bfb155512018aac88a4191fad4f939

    • SSDEEP

      24576:XBLW5gqPvbSfiCRcXw0qU6RmWByuAy5a/owH/1:ZqPvbv/Zwm4yi5aQwHN

    Score
    1/10
    • Target

      Soundpad-Crack-fhtat.xyz/UniteFxUpdate.dll

    • Size

      442KB

    • MD5

      0ee743073ee6b68f8222be2661d95315

    • SHA1

      2e642772ec19edf73422fe25a8d45db1a006ff85

    • SHA256

      562b17370c7283e92a3353b76ab2aefd301c2e78782fa60ec9ee35676ad44f96

    • SHA512

      c3f2037bd37cef7978187f67f1d0633ee3067b4837e0ad9ae2a5c8efab8ec4ce6a14c1d88e200ffaa8677f74fd5995789297e6a7b5ac18d19dc9d53b4d9170ba

    • SSDEEP

      6144:12UHPCFzuxTmVCp41NpA9+2pVbW+i6kdIkl7haKGrgEOHWeohg6yKJIGFEph:12NzSC1Na42ekuMs2eoqO+Dh

    Score
    1/10
    • Target

      Soundpad-Crack-fhtat.xyz/steam_api64.dll

    • Size

      3.4MB

    • MD5

      fde6c8bf079648ef175bfe54a48c33bd

    • SHA1

      86da9176866a1f03ca8ad7fd381c3f2cfc89c6e8

    • SHA256

      0a1e5c53cbad6b21de61e11f023c0d3f11f698164c743bd272741a7ba59ca5d7

    • SHA512

      d750550d1abe01f8b59623e58dd366d3baa6b0a03a48f0c95f381d30481ffd20549801979c3c9d19145521a0f3dd8dbd6397347ec4d3448ab1ef4ad8e781a1ab

    • SSDEEP

      49152:sqg1gpl5AKwKsRtf1Mx5k1aGLCnAWWMWWAwK3TQz4Cq9NVF14ZlEk8gtCbC5qAmk:GUnZ/slM7k/2DaWNcCaEk8oMexLCFJ

    Score
    7/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      Soundpad_x64-3.3.2.msi

    • Size

      6.6MB

    • MD5

      afb6e3c6774d7be5e9f83fa9c7e5955b

    • SHA1

      de1083dfe98a4560dff51c8f5a23390256d689cd

    • SHA256

      41d2b8a6c4474e1b9639b4fa05fcbde7cd9bbea268f43dd84fa5f95cafa49022

    • SHA512

      91c87e591e266b1ba46958b146aedc2a30a7d7c5288d5780ac87e02fdf0c8f1327ec97042c09780dc861cb48f91a35afb547d74154b71ba753c10d77c526140e

    • SSDEEP

      98304:VoOP1lgYAWntNrNTx4hz6e60goXD2zhKO2IDPII326rEjfZHFUO8E7dS:Vp+YhtNJCgLm2zkk0IrrSfZHidE7d

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks