General
-
Target
vrep.msi
-
Size
39.7MB
-
Sample
241123-b4xhca1jbj
-
MD5
87ef82757aba83e7eb63c7c35dbae97a
-
SHA1
7418c4ddeecba68e253e89622ad9ca45597d9350
-
SHA256
79040421b5a48dcc6e611dfe187b2f3e355791ad8511adb84f5c0948aa1d6c89
-
SHA512
605495995a07d7dfaa5d8f09b9d5bde1e0281b5b6581923b9fbd7c103e5ca9f2bb8dcf8e1049c21bd90ac4d68759270d5453e0414c2f6e1eb3ef877eee1a5533
-
SSDEEP
786432:5HqloPKB2RMErvURcUNnywXha1rc3fZ+L28IB1P77y059ze5aaSJJgV6UBXYKe:5HqGRME72cUNnywXg63fxB1P3y031aS1
Static task
static1
Behavioral task
behavioral1
Sample
vrep.msi
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
vrep.msi
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
vrep.msi
-
Size
39.7MB
-
MD5
87ef82757aba83e7eb63c7c35dbae97a
-
SHA1
7418c4ddeecba68e253e89622ad9ca45597d9350
-
SHA256
79040421b5a48dcc6e611dfe187b2f3e355791ad8511adb84f5c0948aa1d6c89
-
SHA512
605495995a07d7dfaa5d8f09b9d5bde1e0281b5b6581923b9fbd7c103e5ca9f2bb8dcf8e1049c21bd90ac4d68759270d5453e0414c2f6e1eb3ef877eee1a5533
-
SSDEEP
786432:5HqloPKB2RMErvURcUNnywXha1rc3fZ+L28IB1P77y059ze5aaSJJgV6UBXYKe:5HqGRME72cUNnywXg63fxB1P3y031aS1
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Netsupport family
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Modifies WinLogon
-
Drops file in System32 directory
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
2Component Object Model Hijacking
1Installer Packages
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
2Component Object Model Hijacking
1Installer Packages
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2System Binary Proxy Execution
1Msiexec
1