General
-
Target
ida-pro_90sp1_x64win.exe
-
Size
462.5MB
-
Sample
250123-tr8c7awqhn
-
MD5
57caca01f05c181d57d238a36c8ce0fa
-
SHA1
0aca1d58d172c8b3cb8d4facb9c03bfb10d0f5d3
-
SHA256
9c85fae6b334bb652543d2a82772301f93149491073f3d362f711cab31719f11
-
SHA512
028441c8f1b610bf9ae78e9a5571b0f498dda809af3b20686bcac023fa9683569dd4df23ab473c03e3bdd15706265cace4599eecf1c5bf5099e68d45abd9de1f
-
SSDEEP
12582912:Cj3sAitGNU1A9rxtCypOOZsZquwbxvPEvqNKLblJ/i:CjcAitGN+I/ObquGJPpOlJ/
Static task
static1
Behavioral task
behavioral1
Sample
ida-pro_90sp1_x64win.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
ida-pro_90sp1_x64win.exe
-
Size
462.5MB
-
MD5
57caca01f05c181d57d238a36c8ce0fa
-
SHA1
0aca1d58d172c8b3cb8d4facb9c03bfb10d0f5d3
-
SHA256
9c85fae6b334bb652543d2a82772301f93149491073f3d362f711cab31719f11
-
SHA512
028441c8f1b610bf9ae78e9a5571b0f498dda809af3b20686bcac023fa9683569dd4df23ab473c03e3bdd15706265cace4599eecf1c5bf5099e68d45abd9de1f
-
SSDEEP
12582912:Cj3sAitGNU1A9rxtCypOOZsZquwbxvPEvqNKLblJ/i:CjcAitGN+I/ObquGJPpOlJ/
-
Industroyer
Contains code associated with parsing industroyer's configuration file.
-
Industroyer family
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Event Triggered Execution: Image File Execution Options Injection
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1