General

  • Target

    DOpusInstall.exe

  • Size

    38.5MB

  • Sample

    241101-vlxj6s1pbv

  • MD5

    99540b8e8d91ae5546fc24410a96c457

  • SHA1

    f36a5a85c041126a48d7486420bf35da8c31d922

  • SHA256

    4d385b9fde266f9685f95949c60ec9f5b29d1bde22de2eb0c882bca8eac71293

  • SHA512

    4400f7bb0a2e78c729228149cd8d47ea55c9b5f3207fc95478c4e31316c42423c4bbf7eece178b316a9153230bc0ac87873ba203d01ff39eb348fdf72b7d14a5

  • SSDEEP

    786432:/kHdKBCtY9GML0dko3ad91eoUJ9gARHTVw6Z1Wq+NYr79b7GE2xlDRB:+g99GM4v3ad99AhRHTVfZ1Wq+0ExN

Malware Config

Targets

    • Target

      DOpusInstall.exe

    • Size

      38.5MB

    • MD5

      99540b8e8d91ae5546fc24410a96c457

    • SHA1

      f36a5a85c041126a48d7486420bf35da8c31d922

    • SHA256

      4d385b9fde266f9685f95949c60ec9f5b29d1bde22de2eb0c882bca8eac71293

    • SHA512

      4400f7bb0a2e78c729228149cd8d47ea55c9b5f3207fc95478c4e31316c42423c4bbf7eece178b316a9153230bc0ac87873ba203d01ff39eb348fdf72b7d14a5

    • SSDEEP

      786432:/kHdKBCtY9GML0dko3ad91eoUJ9gARHTVw6Z1Wq+NYr79b7GE2xlDRB:+g99GM4v3ad99AhRHTVfZ1Wq+0ExN

    • Drops startup file

    • Adds Run key to start application

    • Downloads MZ/PE file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks