General

  • Target

    55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc

  • Size

    2.5MB

  • Sample

    241121-l8gykavrhm

  • MD5

    e7efb48b374fc3589ec6be9f781716fc

  • SHA1

    6e0d6e82e84385eafc1e7f38b444d4a46de63acc

  • SHA256

    55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc

  • SHA512

    8f42efaaf2d56f29779f804cb1df1c8de62ffc86d31d1379d0d658e94702a7300fe9e8df0d5efcbdedf2bbaf2c98fdd0b3ee348f3a4fbea1458c9ac44d155899

  • SSDEEP

    49152:IwbmXVc6q/k62mtrJuQPC/74pEF7qhS3alXRI3NbD/QQ2HG6SHL/8+3:Iwcudy5/748alO9bLkmI

Malware Config

Targets

    • Target

      55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc

    • Size

      2.5MB

    • MD5

      e7efb48b374fc3589ec6be9f781716fc

    • SHA1

      6e0d6e82e84385eafc1e7f38b444d4a46de63acc

    • SHA256

      55646dcc5ff3dff6640506d09fd9ffd270973fd920e29e968531a4b2df1575fc

    • SHA512

      8f42efaaf2d56f29779f804cb1df1c8de62ffc86d31d1379d0d658e94702a7300fe9e8df0d5efcbdedf2bbaf2c98fdd0b3ee348f3a4fbea1458c9ac44d155899

    • SSDEEP

      49152:IwbmXVc6q/k62mtrJuQPC/74pEF7qhS3alXRI3NbD/QQ2HG6SHL/8+3:Iwcudy5/748alO9bLkmI

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks