General

  • Target

    Lose2himatoV2.exe

  • Size

    138.5MB

  • Sample

    250102-sjvxfswlfx

  • MD5

    b13b58171063faf469d7cffd178644a6

  • SHA1

    0cc178b5db25710be4181e0f15b70ca8c3049ef2

  • SHA256

    974cb763c5670a8c187c5e7108964741b8c59590ac35f3bdccb2e069e2ec7506

  • SHA512

    511d96d59fc5646aead6f0bf16ecbe9f9e1ab60e05954b02d2b53c7686df2ccfe85374388fc5aece04e50bd37ff3411319c7107d52cc33c3af819fb47ab570e3

  • SSDEEP

    786432:Y93oFjO6NbbB6uTE/kbsV0jmB/gWD4otJ0njnEMIQAhpLoMS/QVQfmLh0VPdTtLH:Y9SjOsbbUng40ihpEX/QVQfmLmxHXutU

Malware Config

Targets

    • Target

      Lose2himatoV2.exe

    • Size

      138.5MB

    • MD5

      b13b58171063faf469d7cffd178644a6

    • SHA1

      0cc178b5db25710be4181e0f15b70ca8c3049ef2

    • SHA256

      974cb763c5670a8c187c5e7108964741b8c59590ac35f3bdccb2e069e2ec7506

    • SHA512

      511d96d59fc5646aead6f0bf16ecbe9f9e1ab60e05954b02d2b53c7686df2ccfe85374388fc5aece04e50bd37ff3411319c7107d52cc33c3af819fb47ab570e3

    • SSDEEP

      786432:Y93oFjO6NbbB6uTE/kbsV0jmB/gWD4otJ0njnEMIQAhpLoMS/QVQfmLh0VPdTtLH:Y9SjOsbbUng40ihpEX/QVQfmLmxHXutU

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Disables Task Manager via registry modification

    • Indicator Removal: Network Share Connection Removal

      Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

    • Detected potential entity reuse from brand PAYPAL.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks