General

  • Target

    Lagswitch_2.0.1_x86_en-US.msi

  • Size

    3.6MB

  • Sample

    241130-fsycqatpcz

  • MD5

    88f53f1eef043e3f7b931e0461b52287

  • SHA1

    fbebe0190b08236d2acea5a5b41058f0e301aa03

  • SHA256

    d16a0ff410861d71b3be9b7f84200782f36ee7123c69294395f7d362fd1ae767

  • SHA512

    299170a983d1025d7373dabeb6c2dc498a5db94543e5f38c04bb70cd67cc77bace5a84a7e0d7c5e886fe4b412cbe7000d2a1f287d071b935fa30ef4e40f34ccb

  • SSDEEP

    98304:3vrEI3WzXhrWfAIaOm1xV04xPWl1zl0rY4T2VrP9Pv8m:3vQI3+hROmx04x+zI2VrF

Malware Config

Targets

    • Target

      Lagswitch_2.0.1_x86_en-US.msi

    • Size

      3.6MB

    • MD5

      88f53f1eef043e3f7b931e0461b52287

    • SHA1

      fbebe0190b08236d2acea5a5b41058f0e301aa03

    • SHA256

      d16a0ff410861d71b3be9b7f84200782f36ee7123c69294395f7d362fd1ae767

    • SHA512

      299170a983d1025d7373dabeb6c2dc498a5db94543e5f38c04bb70cd67cc77bace5a84a7e0d7c5e886fe4b412cbe7000d2a1f287d071b935fa30ef4e40f34ccb

    • SSDEEP

      98304:3vrEI3WzXhrWfAIaOm1xV04xPWl1zl0rY4T2VrP9Pv8m:3vQI3+hROmx04x+zI2VrF

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks