General

  • Target

    iTunes64Setup.exe

  • Size

    202.0MB

  • Sample

    241122-w3a8yawjg1

  • MD5

    6f5b5621639479d86dd0b3fb3e4ba12a

  • SHA1

    2ca88d8561f9d4395a3cc00aeed5bae2799c2924

  • SHA256

    b3d7c02032ae6ae3649914f70803e21f791b5399e2ff201fbcefad1dc059c192

  • SHA512

    f1d35a246e353452806c3b00690fd4872b850238582a0178616c6100bee00b4abd1de1af06c5cb815055268a07078579831f5f570b0a82459b3992e3ca51c88c

  • SSDEEP

    6291456:e8V6CMvnzMNS2K8ejC0XbllKuplC8nE4VTDd:ZMzvINS22O0XZ1nVTDd

Malware Config

Targets

    • Target

      iTunes64Setup.exe

    • Size

      202.0MB

    • MD5

      6f5b5621639479d86dd0b3fb3e4ba12a

    • SHA1

      2ca88d8561f9d4395a3cc00aeed5bae2799c2924

    • SHA256

      b3d7c02032ae6ae3649914f70803e21f791b5399e2ff201fbcefad1dc059c192

    • SHA512

      f1d35a246e353452806c3b00690fd4872b850238582a0178616c6100bee00b4abd1de1af06c5cb815055268a07078579831f5f570b0a82459b3992e3ca51c88c

    • SSDEEP

      6291456:e8V6CMvnzMNS2K8ejC0XbllKuplC8nE4VTDd:ZMzvINS22O0XZ1nVTDd

    • Modifies firewall policy service

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks