General

  • Target

    Chrome32-64win-e2.exe.vir

  • Size

    49.5MB

  • Sample

    241120-qybq1sxngv

  • MD5

    9a92fb642c8de2a418b0002964795915

  • SHA1

    2842060fa391d281ba178cee76c8997445795753

  • SHA256

    08cde936cf0aea2a3eaa1af53e8e2de33a7a7e240f481ac1457c835555abbce7

  • SHA512

    62522809c52d928bfafc950d3d8be6d0b1c605f03e55b893792e494bc4dfb17876cc36acf9ae01c447b7192b417cc20b172da26312ced54de92838fa54eb1c16

  • SSDEEP

    786432:HwLW+U5I9Zm9jm9jm9jm9jm9jm9jm9jm9jm95:0W+KumNmNmNmNmNmNmNmNmD

Malware Config

Targets

    • Target

      Chrome32-64win-e2.exe.vir

    • Size

      49.5MB

    • MD5

      9a92fb642c8de2a418b0002964795915

    • SHA1

      2842060fa391d281ba178cee76c8997445795753

    • SHA256

      08cde936cf0aea2a3eaa1af53e8e2de33a7a7e240f481ac1457c835555abbce7

    • SHA512

      62522809c52d928bfafc950d3d8be6d0b1c605f03e55b893792e494bc4dfb17876cc36acf9ae01c447b7192b417cc20b172da26312ced54de92838fa54eb1c16

    • SSDEEP

      786432:HwLW+U5I9Zm9jm9jm9jm9jm9jm9jm9jm9jm95:0W+KumNmNmNmNmNmNmNmNmD

    • UAC bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks