General

  • Target

    LETHAL COMPANY.txt

  • Size

    26B

  • Sample

    241027-a4qjcszjfs

  • MD5

    9f6da5a79d422812d079f83184ea3bc8

  • SHA1

    0ef89851ecd2d271e3c246c0b5b6f102d3ceab64

  • SHA256

    4ead1311f52059d6ffab462fd5eb6de890e9d641b4a8a896206e6cb8bf547470

  • SHA512

    ec3f4cc7ae145999aa19fa803aa5adcadc6307c5f1c53560c16e7eb259338665862504033291e61f627aa35a6cd3fe942eee28de20ba019b8fe4860f928ea37e

Malware Config

Targets

    • Target

      LETHAL COMPANY.txt

    • Size

      26B

    • MD5

      9f6da5a79d422812d079f83184ea3bc8

    • SHA1

      0ef89851ecd2d271e3c246c0b5b6f102d3ceab64

    • SHA256

      4ead1311f52059d6ffab462fd5eb6de890e9d641b4a8a896206e6cb8bf547470

    • SHA512

      ec3f4cc7ae145999aa19fa803aa5adcadc6307c5f1c53560c16e7eb259338665862504033291e61f627aa35a6cd3fe942eee28de20ba019b8fe4860f928ea37e

    • Downloads MZ/PE file

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Detected potential entity reuse from brand STEAM.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks