Resubmissions

06/10/2024, 12:35

241006-psg56stgkr 3

06/10/2024, 12:32

241006-pqqpjatfnl 7

General

  • Target

    ryujinx-1.1.1403-win_x64.zip

  • Size

    48.4MB

  • Sample

    241006-pqqpjatfnl

  • MD5

    2ae09cb9053bcbdfade95dd49b191541

  • SHA1

    5b83be48e3dbc96106a45ea2597e31824db90bbd

  • SHA256

    9cc815591e77f5f2ca0e7a74c0b374a5b3778078635722d5918e78ed1e99daef

  • SHA512

    59aaa4ccbe22fdd9ca87403414c41d821a8609eca47d5f8f2f75a971436ca4e045d790f21256c5a78d8a88e7021db07294117b2ea30970af82705d30856d1d03

  • SSDEEP

    1572864:29WUe83ZKZROP5LTciS3SGhgVS63ZKZROP5LTciS3SGhgVSbo:2MYBP8SGGSYBP8SGGSbo

Malware Config

Targets

    • Target

      ryujinx-1.1.1403-win_x64.zip

    • Size

      48.4MB

    • MD5

      2ae09cb9053bcbdfade95dd49b191541

    • SHA1

      5b83be48e3dbc96106a45ea2597e31824db90bbd

    • SHA256

      9cc815591e77f5f2ca0e7a74c0b374a5b3778078635722d5918e78ed1e99daef

    • SHA512

      59aaa4ccbe22fdd9ca87403414c41d821a8609eca47d5f8f2f75a971436ca4e045d790f21256c5a78d8a88e7021db07294117b2ea30970af82705d30856d1d03

    • SSDEEP

      1572864:29WUe83ZKZROP5LTciS3SGhgVS63ZKZROP5LTciS3SGhgVSbo:2MYBP8SGGSYBP8SGGSbo

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks