General

  • Target

    b0a8d541b650ffff1bb4b3690af389e52b1675212129560dbe33038b1041266b.exe

  • Size

    5.4MB

  • Sample

    250107-c52n5azpdv

  • MD5

    70d47fa2e078f04400d3d1b236245678

  • SHA1

    987aa3368265fc300b10b4128d8367c3d7a29c6c

  • SHA256

    b0a8d541b650ffff1bb4b3690af389e52b1675212129560dbe33038b1041266b

  • SHA512

    a078ec2aa08f1928b7cef2b3b17e02e5a52860dd684ad798ab8aca0a55d1069f45e27497fabf15c4e932299fe206ed4e49085848a1bc3ae087b13ece36f768e2

  • SSDEEP

    49152:AEEL5cx5xTkYJkGYYpT0+TFiH7efP8Q1yJJ4ZD1F5z97oL1YbGQ+okRPGHpRPqM8:pEs6efPNwJ4t1h0cG5FGJRPxow8O

Malware Config

Targets

    • Target

      b0a8d541b650ffff1bb4b3690af389e52b1675212129560dbe33038b1041266b.exe

    • Size

      5.4MB

    • MD5

      70d47fa2e078f04400d3d1b236245678

    • SHA1

      987aa3368265fc300b10b4128d8367c3d7a29c6c

    • SHA256

      b0a8d541b650ffff1bb4b3690af389e52b1675212129560dbe33038b1041266b

    • SHA512

      a078ec2aa08f1928b7cef2b3b17e02e5a52860dd684ad798ab8aca0a55d1069f45e27497fabf15c4e932299fe206ed4e49085848a1bc3ae087b13ece36f768e2

    • SSDEEP

      49152:AEEL5cx5xTkYJkGYYpT0+TFiH7efP8Q1yJJ4ZD1F5z97oL1YbGQ+okRPGHpRPqM8:pEs6efPNwJ4t1h0cG5FGJRPxow8O

    • Sets service image path in registry

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Boot or Logon Autostart Execution: Authentication Package

      Suspicious Windows Authentication Registry Modification.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks