General

  • Target

    reboot_launcher-9.2.7+9.2.7-windows-setup.exe

  • Size

    69.5MB

  • Sample

    241005-pkq34sshkm

  • MD5

    bfecd3cd092a3224723e48b147767880

  • SHA1

    5a7ace5dc9ee44d5916b1b679ee2f4cc6584007e

  • SHA256

    e12b35bb96f789fe856cae00c7cf465bf355c8315878e502527262fff3e74fcf

  • SHA512

    179fa2f0ad6540d511fcbb5aab86dde8c32c5d2c3f3dda0ae71a9443dcc478e7ebfc11089305ff4924f272d600979422d657c2e19069cb792e76e392c5bd4e95

  • SSDEEP

    1572864:ALlXQv2+gRYYxOP+bobZwWbqH59R0V4AwDBEZX61JJU9+H9Ip+KaV4e63:YXO2+gw+b4+WCRpk5CJJU9+dIGV4e63

Malware Config

Targets

    • Target

      reboot_launcher-9.2.7+9.2.7-windows-setup.exe

    • Size

      69.5MB

    • MD5

      bfecd3cd092a3224723e48b147767880

    • SHA1

      5a7ace5dc9ee44d5916b1b679ee2f4cc6584007e

    • SHA256

      e12b35bb96f789fe856cae00c7cf465bf355c8315878e502527262fff3e74fcf

    • SHA512

      179fa2f0ad6540d511fcbb5aab86dde8c32c5d2c3f3dda0ae71a9443dcc478e7ebfc11089305ff4924f272d600979422d657c2e19069cb792e76e392c5bd4e95

    • SSDEEP

      1572864:ALlXQv2+gRYYxOP+bobZwWbqH59R0V4AwDBEZX61JJU9+H9Ip+KaV4e63:YXO2+gw+b4+WCRpk5CJJU9+dIGV4e63

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks