General
-
Target
setup-w8.1-1.4.6.exe
-
Size
2.1MB
-
Sample
241015-brx84swglb
-
MD5
938548152c35c028b942b33088d0f3b9
-
SHA1
6ead124c740dfddc2ab09f1739df760c6d1ee7d3
-
SHA256
108a8be5260047a10d49105e7f5c22f949bae4e866278b169b66358ea43145ff
-
SHA512
004bd6ca1e1dbbbe258fe42dcb628607e4a178f09bc40637a9660568953be883f7ecd48e8b07fe54a90757732bf05e106d1a5b89e486c2b36314e1c4f851b86e
-
SSDEEP
49152:8UYpE9Sa8jnyceXiIEeSavDw9M68bkF2xlEVRv/OiMpe/K7U:ZYpE7KWS49uKY+EVRv/OdpeAU
Static task
static1
Behavioral task
behavioral1
Sample
setup-w8.1-1.4.6.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
setup-w8.1-1.4.6.exe
-
Size
2.1MB
-
MD5
938548152c35c028b942b33088d0f3b9
-
SHA1
6ead124c740dfddc2ab09f1739df760c6d1ee7d3
-
SHA256
108a8be5260047a10d49105e7f5c22f949bae4e866278b169b66358ea43145ff
-
SHA512
004bd6ca1e1dbbbe258fe42dcb628607e4a178f09bc40637a9660568953be883f7ecd48e8b07fe54a90757732bf05e106d1a5b89e486c2b36314e1c4f851b86e
-
SSDEEP
49152:8UYpE9Sa8jnyceXiIEeSavDw9M68bkF2xlEVRv/OiMpe/K7U:ZYpE7KWS49uKY+EVRv/OdpeAU
-
r77 rootkit payload
Detects the payload of the r77 rootkit.
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1AppInit DLLs
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1AppInit DLLs
1Scheduled Task/Job
1Scheduled Task
1