General

  • Target

    unlocker-setup.exe

  • Size

    2.1MB

  • Sample

    241005-t6gtsaxbnr

  • MD5

    646261d89e30c36b938da1d7134691c9

  • SHA1

    b25491854b409f454277586d97d2ead28168e6ec

  • SHA256

    2efdffd1cf3adab21ff760f009d8893d8c4cbcf63b2c3bfcc1139457c9cd430b

  • SHA512

    529160fe12a38d986f0b670d0334acc377490b86dc30e6d03227507b1f28b0d85ed17a4f1351108e516bf1635d5f5d73b10e6cc39fcc87e7e94b486c10fcde82

  • SSDEEP

    49152:3mpEKwG7f0e4qkpPNFXbMXuesDNkferBmyYwfPG:0EKwwfjYFFXNesuoPG

Malware Config

Targets

    • Target

      unlocker-setup.exe

    • Size

      2.1MB

    • MD5

      646261d89e30c36b938da1d7134691c9

    • SHA1

      b25491854b409f454277586d97d2ead28168e6ec

    • SHA256

      2efdffd1cf3adab21ff760f009d8893d8c4cbcf63b2c3bfcc1139457c9cd430b

    • SHA512

      529160fe12a38d986f0b670d0334acc377490b86dc30e6d03227507b1f28b0d85ed17a4f1351108e516bf1635d5f5d73b10e6cc39fcc87e7e94b486c10fcde82

    • SSDEEP

      49152:3mpEKwG7f0e4qkpPNFXbMXuesDNkferBmyYwfPG:0EKwwfjYFFXNesuoPG

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks