General
-
Target
unlocker-setup.exe
-
Size
2.1MB
-
Sample
241005-t6gtsaxbnr
-
MD5
646261d89e30c36b938da1d7134691c9
-
SHA1
b25491854b409f454277586d97d2ead28168e6ec
-
SHA256
2efdffd1cf3adab21ff760f009d8893d8c4cbcf63b2c3bfcc1139457c9cd430b
-
SHA512
529160fe12a38d986f0b670d0334acc377490b86dc30e6d03227507b1f28b0d85ed17a4f1351108e516bf1635d5f5d73b10e6cc39fcc87e7e94b486c10fcde82
-
SSDEEP
49152:3mpEKwG7f0e4qkpPNFXbMXuesDNkferBmyYwfPG:0EKwwfjYFFXNesuoPG
Static task
static1
Behavioral task
behavioral1
Sample
unlocker-setup.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
unlocker-setup.exe
-
Size
2.1MB
-
MD5
646261d89e30c36b938da1d7134691c9
-
SHA1
b25491854b409f454277586d97d2ead28168e6ec
-
SHA256
2efdffd1cf3adab21ff760f009d8893d8c4cbcf63b2c3bfcc1139457c9cd430b
-
SHA512
529160fe12a38d986f0b670d0334acc377490b86dc30e6d03227507b1f28b0d85ed17a4f1351108e516bf1635d5f5d73b10e6cc39fcc87e7e94b486c10fcde82
-
SSDEEP
49152:3mpEKwG7f0e4qkpPNFXbMXuesDNkferBmyYwfPG:0EKwwfjYFFXNesuoPG
Score5/10-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Privilege Escalation
Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1