General

  • Target

    VMAX Natural Spoofer.exe

  • Size

    9.2MB

  • Sample

    250101-v15t4avley

  • MD5

    a6129c646b196df9fcef34dce7a7428d

  • SHA1

    49bae728bd8de917297d4cc4cc4b2920306ee465

  • SHA256

    54f7df5f092440505a44b30d40fc9c8947f12681fe5f9b107d4be5d0be3820e0

  • SHA512

    07bd51bfea9766f4f337c3e40b39abdac1be36696bf24bf41c7c0d068b3bdd5c6011ca6302f294fa75144cfbd6556a34c06ed1e9be8db720f4f3e9f5c83307ae

  • SSDEEP

    196608:h10WVQ67ddt0ydv8Dx7Ic+5iUsU782QqNv9FRVOCq+Zx:CsjdERIKWBv9FICx

Malware Config

Targets

    • Target

      VMAX Natural Spoofer.exe

    • Size

      9.2MB

    • MD5

      a6129c646b196df9fcef34dce7a7428d

    • SHA1

      49bae728bd8de917297d4cc4cc4b2920306ee465

    • SHA256

      54f7df5f092440505a44b30d40fc9c8947f12681fe5f9b107d4be5d0be3820e0

    • SHA512

      07bd51bfea9766f4f337c3e40b39abdac1be36696bf24bf41c7c0d068b3bdd5c6011ca6302f294fa75144cfbd6556a34c06ed1e9be8db720f4f3e9f5c83307ae

    • SSDEEP

      196608:h10WVQ67ddt0ydv8Dx7Ic+5iUsU782QqNv9FRVOCq+Zx:CsjdERIKWBv9FICx

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Detected potential entity reuse from brand MICROSOFT.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks