General

  • Target

    2024-10-09_d46d537af6048491d43f5ee3e47c5da6_hijackloader_jeefo_magniber

  • Size

    6.5MB

  • Sample

    241009-r2dkfs1gnc

  • MD5

    d46d537af6048491d43f5ee3e47c5da6

  • SHA1

    5b1d6751187d01ff5930cfee64e85b96138bdaef

  • SHA256

    db2d7e21bae2b95afaf1e80149a1c0d107e26c469a06b45939712a65d6122763

  • SHA512

    e9d5b655e4ab1ed439b070b8483d91c30d7dd5565431fc7512b66079f6908c923ec162e9740809140219bc1a0781716f220d31fdf539d0a4fe87412bcaba3b2a

  • SSDEEP

    196608:OlOnP6tx1DBvNDgio+rRhbSgIzH1a43r0VKob0Iqg1KNkN:Sx1DlNZoMbB

Malware Config

Targets

    • Target

      2024-10-09_d46d537af6048491d43f5ee3e47c5da6_hijackloader_jeefo_magniber

    • Size

      6.5MB

    • MD5

      d46d537af6048491d43f5ee3e47c5da6

    • SHA1

      5b1d6751187d01ff5930cfee64e85b96138bdaef

    • SHA256

      db2d7e21bae2b95afaf1e80149a1c0d107e26c469a06b45939712a65d6122763

    • SHA512

      e9d5b655e4ab1ed439b070b8483d91c30d7dd5565431fc7512b66079f6908c923ec162e9740809140219bc1a0781716f220d31fdf539d0a4fe87412bcaba3b2a

    • SSDEEP

      196608:OlOnP6tx1DBvNDgio+rRhbSgIzH1a43r0VKob0Iqg1KNkN:Sx1DlNZoMbB

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks