General

  • Target

    CheatEngine75(1).exe

  • Size

    28.5MB

  • Sample

    241121-tslktatlft

  • MD5

    c3f786eb369833607a8445337350f644

  • SHA1

    20954ddfa14a121a18dd0c123abc7486984dcf4b

  • SHA256

    8992a1084fe37504e9e52077a1c8a73e75634c94f4493803de269cb1c2aa884f

  • SHA512

    fb7f74dba06b001b5d6c303664e90474fe4178ee0dfd90fa07773b3a6ae72db0a5098a5764035687f5106e0501d47c53cc39374506db27333a582b08cad5dc4d

  • SSDEEP

    786432:Ml3LNCxuEnwFho+zM77UDZiZCd08jFZJAI5E70TZFHCr:Ml3LMEXFhV0KAcNjxAItjU

Malware Config

Targets

    • Target

      CheatEngine75(1).exe

    • Size

      28.5MB

    • MD5

      c3f786eb369833607a8445337350f644

    • SHA1

      20954ddfa14a121a18dd0c123abc7486984dcf4b

    • SHA256

      8992a1084fe37504e9e52077a1c8a73e75634c94f4493803de269cb1c2aa884f

    • SHA512

      fb7f74dba06b001b5d6c303664e90474fe4178ee0dfd90fa07773b3a6ae72db0a5098a5764035687f5106e0501d47c53cc39374506db27333a582b08cad5dc4d

    • SSDEEP

      786432:Ml3LNCxuEnwFho+zM77UDZiZCd08jFZJAI5E70TZFHCr:Ml3LMEXFhV0KAcNjxAItjU

    • Stops running service(s)

    • Modifies file permissions

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks