General

  • Target

    xiaoma.exe.v

  • Size

    1.8MB

  • Sample

    241121-leax6a1kaw

  • MD5

    9348f5c3958b63ccbea7445cfe346280

  • SHA1

    6e0622bef345cc193f8eb2cb2d43900dfe6c91e1

  • SHA256

    f8f0dc0aa43c0461d254cbbb0a4a8d4d8e00234020502a0993cc636e9dcf3f8f

  • SHA512

    84ec3429a23459418697ab247daf07ac93e1bf0b76822ed7ed065f5de933545e537421dc74639f394b536cc4e148446cb0880e2367efa9bab64d1b35ab716921

  • SSDEEP

    24576:Qq9fTCadIMwPw6iDvuIwpAiFXaIqXUOJLKT3xlUVcvsn9ueScRd/wxn17:n97C2GH0IqtgFlZsn9ueoxn17

Malware Config

Targets

    • Target

      xiaoma.exe.v

    • Size

      1.8MB

    • MD5

      9348f5c3958b63ccbea7445cfe346280

    • SHA1

      6e0622bef345cc193f8eb2cb2d43900dfe6c91e1

    • SHA256

      f8f0dc0aa43c0461d254cbbb0a4a8d4d8e00234020502a0993cc636e9dcf3f8f

    • SHA512

      84ec3429a23459418697ab247daf07ac93e1bf0b76822ed7ed065f5de933545e537421dc74639f394b536cc4e148446cb0880e2367efa9bab64d1b35ab716921

    • SSDEEP

      24576:Qq9fTCadIMwPw6iDvuIwpAiFXaIqXUOJLKT3xlUVcvsn9ueScRd/wxn17:n97C2GH0IqtgFlZsn9ueoxn17

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks