General

  • Target

    Extreme_V4.2.exe

  • Size

    44KB

  • Sample

    241206-3hgcsatmfz

  • MD5

    42543291c63df7ea7c65ecb6577f915a

  • SHA1

    8ea6dac698bd1f222406247267d251bc752b0ec2

  • SHA256

    49aa63c8ffb77bae81987916b809f168442807c87de01f7baa01b430a28a669f

  • SHA512

    c98514fcf6e8b8f8b53793ce9ed773d78ba3aee7411c7a35fd8c047dda6def5556d36582138159f418744410242f10f3a6cdc91723e572b664478e61ef643523

  • SSDEEP

    768:GoVzlbz8pRftp9hNsOjz4td8n07CO0f8cbFX36F8nbcuyD7U:FNlbuRfbF/jzeq0eO00oaCnouy8

Malware Config

Targets

    • Target

      Extreme_V4.2.exe

    • Size

      44KB

    • MD5

      42543291c63df7ea7c65ecb6577f915a

    • SHA1

      8ea6dac698bd1f222406247267d251bc752b0ec2

    • SHA256

      49aa63c8ffb77bae81987916b809f168442807c87de01f7baa01b430a28a669f

    • SHA512

      c98514fcf6e8b8f8b53793ce9ed773d78ba3aee7411c7a35fd8c047dda6def5556d36582138159f418744410242f10f3a6cdc91723e572b664478e61ef643523

    • SSDEEP

      768:GoVzlbz8pRftp9hNsOjz4td8n07CO0f8cbFX36F8nbcuyD7U:FNlbuRfbF/jzeq0eO00oaCnouy8

    • UAC bypass

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Remote Services: SMB/Windows Admin Shares

      Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks