General

  • Target

    unlocker-setup.exe

  • Size

    2.1MB

  • Sample

    241005-t6gtsaxbnr

  • MD5

    646261d89e30c36b938da1d7134691c9

  • SHA1

    b25491854b409f454277586d97d2ead28168e6ec

  • SHA256

    2efdffd1cf3adab21ff760f009d8893d8c4cbcf63b2c3bfcc1139457c9cd430b

  • SHA512

    529160fe12a38d986f0b670d0334acc377490b86dc30e6d03227507b1f28b0d85ed17a4f1351108e516bf1635d5f5d73b10e6cc39fcc87e7e94b486c10fcde82

  • SSDEEP

    49152:3mpEKwG7f0e4qkpPNFXbMXuesDNkferBmyYwfPG:0EKwwfjYFFXNesuoPG

Malware Config

Targets

    • Target

      unlocker-setup.exe

    • Size

      2.1MB

    • MD5

      646261d89e30c36b938da1d7134691c9

    • SHA1

      b25491854b409f454277586d97d2ead28168e6ec

    • SHA256

      2efdffd1cf3adab21ff760f009d8893d8c4cbcf63b2c3bfcc1139457c9cd430b

    • SHA512

      529160fe12a38d986f0b670d0334acc377490b86dc30e6d03227507b1f28b0d85ed17a4f1351108e516bf1635d5f5d73b10e6cc39fcc87e7e94b486c10fcde82

    • SSDEEP

      49152:3mpEKwG7f0e4qkpPNFXbMXuesDNkferBmyYwfPG:0EKwwfjYFFXNesuoPG

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.