General

  • Target

    Playboi Carti - ALL RED (Official Visualizer).mp4

  • Size

    49.6MB

  • Sample

    240930-bsq67avcpa

  • MD5

    661ebdd7fcc72f19867e4ff4f72f4c48

  • SHA1

    aa7e42b05ce39ed6d3b183e7aa12ea639f1ba0d5

  • SHA256

    f70fbd04ff0c397dbc5d1b407d1972700314a19ae46c36169a616bafb6fb3630

  • SHA512

    701c229eee038c6b91c1bd3d832cce37ba9c6a2d942aab96cc9c804a990c3478342bea5ed60d65406698661765cea9f3852aef892213c3f0a039a08706caf531

  • SSDEEP

    786432:FgltuZRUg2PJ40ELz/adTltk+/XWVlT/9VDcsmVUys6w2Pw4mhXyqtx9Gskhxh/U:FCEHMT7kbc/7sNN4aCqvOxh/L1S

Malware Config

Targets

    • Target

      Playboi Carti - ALL RED (Official Visualizer).mp4

    • Size

      49.6MB

    • MD5

      661ebdd7fcc72f19867e4ff4f72f4c48

    • SHA1

      aa7e42b05ce39ed6d3b183e7aa12ea639f1ba0d5

    • SHA256

      f70fbd04ff0c397dbc5d1b407d1972700314a19ae46c36169a616bafb6fb3630

    • SHA512

      701c229eee038c6b91c1bd3d832cce37ba9c6a2d942aab96cc9c804a990c3478342bea5ed60d65406698661765cea9f3852aef892213c3f0a039a08706caf531

    • SSDEEP

      786432:FgltuZRUg2PJ40ELz/adTltk+/XWVlT/9VDcsmVUys6w2Pw4mhXyqtx9Gskhxh/U:FCEHMT7kbc/7sNN4aCqvOxh/L1S

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks