General
-
Target
xiaoma.exe.v
-
Size
1.8MB
-
Sample
241121-leax6a1kaw
-
MD5
9348f5c3958b63ccbea7445cfe346280
-
SHA1
6e0622bef345cc193f8eb2cb2d43900dfe6c91e1
-
SHA256
f8f0dc0aa43c0461d254cbbb0a4a8d4d8e00234020502a0993cc636e9dcf3f8f
-
SHA512
84ec3429a23459418697ab247daf07ac93e1bf0b76822ed7ed065f5de933545e537421dc74639f394b536cc4e148446cb0880e2367efa9bab64d1b35ab716921
-
SSDEEP
24576:Qq9fTCadIMwPw6iDvuIwpAiFXaIqXUOJLKT3xlUVcvsn9ueScRd/wxn17:n97C2GH0IqtgFlZsn9ueoxn17
Static task
static1
Behavioral task
behavioral1
Sample
xiaoma.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
xiaoma.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
xiaoma.exe.v
-
Size
1.8MB
-
MD5
9348f5c3958b63ccbea7445cfe346280
-
SHA1
6e0622bef345cc193f8eb2cb2d43900dfe6c91e1
-
SHA256
f8f0dc0aa43c0461d254cbbb0a4a8d4d8e00234020502a0993cc636e9dcf3f8f
-
SHA512
84ec3429a23459418697ab247daf07ac93e1bf0b76822ed7ed065f5de933545e537421dc74639f394b536cc4e148446cb0880e2367efa9bab64d1b35ab716921
-
SSDEEP
24576:Qq9fTCadIMwPw6iDvuIwpAiFXaIqXUOJLKT3xlUVcvsn9ueScRd/wxn17:n97C2GH0IqtgFlZsn9ueoxn17
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Indicator Removal
1File Deletion
1Pre-OS Boot
1Bootkit
1