General

  • Target

    WareStore.2.0.1.exe

  • Size

    17.6MB

  • Sample

    250109-bghqnstnhj

  • MD5

    727f1707ca5287b88b5b70d6bbd1eb6b

  • SHA1

    27875c9bceebbdb16d0ad04cdec0fa216cf13f5a

  • SHA256

    534c4826cc04c395bf55f9f60ba973f49c54ad8a5acd180ad8837a5461ce35c3

  • SHA512

    c545c686730a0976007783e49ff7c539f152da470f27ec620b2f34381ff153d3ba95a00ac6e9662c657f12eeacd551a7e6113e2993e576091f8d3845356f31e5

  • SSDEEP

    393216:U9W8sQwq3Obs2Cls0pXMCHWUj5rRQ7XbFsn6fLwzr5+uoYChFKuBvl3JXcS:U9W81wq3ObRqs0pXMb85rRQ766zur5+r

Malware Config

Targets

    • Target

      WareStore.2.0.1.exe

    • Size

      17.6MB

    • MD5

      727f1707ca5287b88b5b70d6bbd1eb6b

    • SHA1

      27875c9bceebbdb16d0ad04cdec0fa216cf13f5a

    • SHA256

      534c4826cc04c395bf55f9f60ba973f49c54ad8a5acd180ad8837a5461ce35c3

    • SHA512

      c545c686730a0976007783e49ff7c539f152da470f27ec620b2f34381ff153d3ba95a00ac6e9662c657f12eeacd551a7e6113e2993e576091f8d3845356f31e5

    • SSDEEP

      393216:U9W8sQwq3Obs2Cls0pXMCHWUj5rRQ7XbFsn6fLwzr5+uoYChFKuBvl3JXcS:U9W81wq3ObRqs0pXMb85rRQ766zur5+r

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Detected potential entity reuse from brand MICROSOFT.

    • Detected potential entity reuse from brand STEAM.

MITRE ATT&CK Enterprise v15

Tasks