General

  • Target

    KexSetup_Release.exe

  • Size

    3.9MB

  • Sample

    250112-laaftsymel

  • MD5

    5ff4a6c13b8c01e51042ac1213f39a34

  • SHA1

    28709831e3f5833fd5ba679d05e7a20981c550cc

  • SHA256

    1e15a4290cff615f5b7dc68e1e4588778f5172ac0ed50a111885ae2d7ff2c76d

  • SHA512

    09474c45cbd93897c5a9240d25b4b491e3ceba6fbcef5b79b01b7e25a5af84a9b17b34c683bd9e73db4a916901809c53336035a0757b856d0cbb17dc3b2dd107

  • SSDEEP

    98304:DST4mY6vkrpMgT3epjrsbLXMhN0U4N8l/MDxW76+44IY:uTY6vMMgT3eRuWpRz6+4xY

Malware Config

Targets

    • Target

      KexSetup_Release.exe

    • Size

      3.9MB

    • MD5

      5ff4a6c13b8c01e51042ac1213f39a34

    • SHA1

      28709831e3f5833fd5ba679d05e7a20981c550cc

    • SHA256

      1e15a4290cff615f5b7dc68e1e4588778f5172ac0ed50a111885ae2d7ff2c76d

    • SHA512

      09474c45cbd93897c5a9240d25b4b491e3ceba6fbcef5b79b01b7e25a5af84a9b17b34c683bd9e73db4a916901809c53336035a0757b856d0cbb17dc3b2dd107

    • SSDEEP

      98304:DST4mY6vkrpMgT3epjrsbLXMhN0U4N8l/MDxW76+44IY:uTY6vMMgT3eRuWpRz6+4xY

    • Renames multiple (51) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Detected potential entity reuse from brand STEAM.

MITRE ATT&CK Enterprise v15

Tasks