General

  • Target

    game.exe

  • Size

    67KB

  • Sample

    241121-k9vqdavpdp

  • MD5

    7e90ee492e1cee3ea413effb58a515d2

  • SHA1

    ee0a47bff38d72e832ec3fadf8960bdec416895a

  • SHA256

    e9e5717f2113fdd93ab6545310cac13501e00127141790c5d718686c46d166fe

  • SHA512

    4094aeeefc4f0e1cb6eaecf412daf62a7dd754f4571462828548a01e1d30f326f6ddf876ef8b581c387f2471e7616db3e4b1592e84319657e83edaec7e7ef30a

  • SSDEEP

    768:Zo+beK2pD2HSMviUD0XekzzjH+VVHXj4LZI+mlCrL7lSjk2Fjm6rjVW6Pgs01B6E:ZGKkD2HNviUxRXmZbmluBDOa0WPRjJ

Malware Config

Targets

    • Target

      game.exe

    • Size

      67KB

    • MD5

      7e90ee492e1cee3ea413effb58a515d2

    • SHA1

      ee0a47bff38d72e832ec3fadf8960bdec416895a

    • SHA256

      e9e5717f2113fdd93ab6545310cac13501e00127141790c5d718686c46d166fe

    • SHA512

      4094aeeefc4f0e1cb6eaecf412daf62a7dd754f4571462828548a01e1d30f326f6ddf876ef8b581c387f2471e7616db3e4b1592e84319657e83edaec7e7ef30a

    • SSDEEP

      768:Zo+beK2pD2HSMviUD0XekzzjH+VVHXj4LZI+mlCrL7lSjk2Fjm6rjVW6Pgs01B6E:ZGKkD2HNviUxRXmZbmluBDOa0WPRjJ

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks