General

  • Target

    xxmi-launcher-installer-online-v104.zip

  • Size

    60.5MB

  • Sample

    241017-rgel1stfkq

  • MD5

    eb1e2b36589dbe590ff200d94a392d3d

  • SHA1

    cfdb256ffbc8cb969e0a8c2a714e090d74053b56

  • SHA256

    c6811933083157ebb51e6ac65b0b9f20f62198c923d47ba5f39c010de049a353

  • SHA512

    5fe561a77e826d4afd3fb2e8f53e314f21cbe19641f0c5bc56e87ed5c22abad5657c680ba6a3266a274fb851f6dfec103d20691dfd95cf99558b19a9021d4631

  • SSDEEP

    1572864:TpdCTCFNZMKWTO/jbnHZt15B7+0SkQ3phGXC/uWxC5bHDH2rb0lIUx3y5e:FJFsFTIbHtrJgGXC/eH6glIUl4e

Malware Config

Targets

    • Target

      XXMI-Launcher-Installer-Online-v1.0.4.msi

    • Size

      87.1MB

    • MD5

      ade799235aaf27c7a98381a7813467ec

    • SHA1

      74dddc921c62363b9df68fe4a68cdcf569d23b47

    • SHA256

      68068ff8e4d417bdd54e14395fcaf965ddc0784343496d69f8ddce1f5ec89e80

    • SHA512

      b8ef4d5e58589d5d16ed10d51f55d5abfabc6f909a86a82115825250dc51362b4e836c827a586494c1220b9a6345c591ef4b07219c22e2fa4053831664cff48b

    • SSDEEP

      1572864:aWzi879+zykLmz37KOTZd9VUd7fEFqmMrAA1iHUw9oFdxPlY/NMvm6NsVY:agbOBEUdD1iH2lsmvm6im

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks