General

  • Target

    MSCO-Launcher-Installer.rar

  • Size

    1.9MB

  • Sample

    241223-w58bfsxlet

  • MD5

    a5376fece6d787e42865f1d5469adb40

  • SHA1

    699ee395e6a210e9e55ebc66e7fbd09a17bdc59a

  • SHA256

    515941d03cd64090bcbd55b408318afe85746ce73c2dec7015ea25661b7ffd33

  • SHA512

    e1224c963cb2bb0d6c565baab3a14b7e4a5d31882e644c01210b41bbdcead24e1f3cc8843556dadccb4a8581f86b196e051da6b4631147e822eacb1168d0c3f6

  • SSDEEP

    49152:GoPsNyHm0WFUU4Fh7uUdMUKboZRaXuGttUpQ/XBMflen31WyI/:NMyGdFU5FdK2bGttHvG9A31M/

Malware Config

Targets

    • Target

      MSCO Launcher Installer.exe

    • Size

      2.5MB

    • MD5

      dcc9834e12785d06097f8dc3ae237c73

    • SHA1

      d48b91dba33cf36bd7f919fe7e3d36d206cdf7f6

    • SHA256

      25a97ae06dedb72a89580cbd8f5567ab5d26b7a5c20930299969082dccba6c83

    • SHA512

      4caa3bde7dbe50a8ed3e3be34e0b894f926df2c4e77ceff1300ad0d2f8122debf908e512fa77ea3cf6119b199bc2649bb8bf843a904f1754fb384741cdea51bc

    • SSDEEP

      49152:tBuZrEUvZlqSzSIlcSYls5bqnxY/LlYQ5t0IU55DdN7POGjt:7kLvZlqSz/9YlsyY/LlYQ//U55ljt

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Detected potential entity reuse from brand STEAM.

MITRE ATT&CK Enterprise v15

Tasks