General

  • Target

    osu!install(1).exe

  • Size

    10.5MB

  • Sample

    241024-bcpneszbll

  • MD5

    1663e1bb0ef07762453a60b76fcfbb0d

  • SHA1

    ccaa0775273c1acb0fdd0c3580d324ad5d37acb8

  • SHA256

    45d0326ad63a9eda3ce50311e2d07b6a866203d7bd20991aa108783362ce6fc6

  • SHA512

    6a75f7d8613fbd49981ff070a9ea20306e03ea63033876515c485f4ea9d88d88ff948536eccd3d5d296dc3c2093c334377807db0759a06f509827a7d92c3c25b

  • SSDEEP

    196608:BHuYy59YCmZOlwwUg7wfI9jUCzi4H1qSiXLGVi7DMgpZASEyQ0VMwICEc/jy:g5CCqOlwwUg4IHziK1piXLGVE4UrS0VA

Malware Config

Targets

    • Target

      osu!install(1).exe

    • Size

      10.5MB

    • MD5

      1663e1bb0ef07762453a60b76fcfbb0d

    • SHA1

      ccaa0775273c1acb0fdd0c3580d324ad5d37acb8

    • SHA256

      45d0326ad63a9eda3ce50311e2d07b6a866203d7bd20991aa108783362ce6fc6

    • SHA512

      6a75f7d8613fbd49981ff070a9ea20306e03ea63033876515c485f4ea9d88d88ff948536eccd3d5d296dc3c2093c334377807db0759a06f509827a7d92c3c25b

    • SSDEEP

      196608:BHuYy59YCmZOlwwUg7wfI9jUCzi4H1qSiXLGVi7DMgpZASEyQ0VMwICEc/jy:g5CCqOlwwUg4IHziK1piXLGVE4UrS0VA

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks