General
-
Target
osu!install(1).exe
-
Size
10.5MB
-
Sample
241024-bcpneszbll
-
MD5
1663e1bb0ef07762453a60b76fcfbb0d
-
SHA1
ccaa0775273c1acb0fdd0c3580d324ad5d37acb8
-
SHA256
45d0326ad63a9eda3ce50311e2d07b6a866203d7bd20991aa108783362ce6fc6
-
SHA512
6a75f7d8613fbd49981ff070a9ea20306e03ea63033876515c485f4ea9d88d88ff948536eccd3d5d296dc3c2093c334377807db0759a06f509827a7d92c3c25b
-
SSDEEP
196608:BHuYy59YCmZOlwwUg7wfI9jUCzi4H1qSiXLGVi7DMgpZASEyQ0VMwICEc/jy:g5CCqOlwwUg4IHziK1piXLGVE4UrS0VA
Behavioral task
behavioral1
Sample
osu!install(1).exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
osu!install(1).exe
-
Size
10.5MB
-
MD5
1663e1bb0ef07762453a60b76fcfbb0d
-
SHA1
ccaa0775273c1acb0fdd0c3580d324ad5d37acb8
-
SHA256
45d0326ad63a9eda3ce50311e2d07b6a866203d7bd20991aa108783362ce6fc6
-
SHA512
6a75f7d8613fbd49981ff070a9ea20306e03ea63033876515c485f4ea9d88d88ff948536eccd3d5d296dc3c2093c334377807db0759a06f509827a7d92c3c25b
-
SSDEEP
196608:BHuYy59YCmZOlwwUg7wfI9jUCzi4H1qSiXLGVi7DMgpZASEyQ0VMwICEc/jy:g5CCqOlwwUg4IHziK1piXLGVE4UrS0VA
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1