General

  • Target

    ida-pro_90sp1_x64win.exe

  • Size

    462.5MB

  • Sample

    250123-tr8c7awqhn

  • MD5

    57caca01f05c181d57d238a36c8ce0fa

  • SHA1

    0aca1d58d172c8b3cb8d4facb9c03bfb10d0f5d3

  • SHA256

    9c85fae6b334bb652543d2a82772301f93149491073f3d362f711cab31719f11

  • SHA512

    028441c8f1b610bf9ae78e9a5571b0f498dda809af3b20686bcac023fa9683569dd4df23ab473c03e3bdd15706265cace4599eecf1c5bf5099e68d45abd9de1f

  • SSDEEP

    12582912:Cj3sAitGNU1A9rxtCypOOZsZquwbxvPEvqNKLblJ/i:CjcAitGN+I/ObquGJPpOlJ/

Malware Config

Targets

    • Target

      ida-pro_90sp1_x64win.exe

    • Size

      462.5MB

    • MD5

      57caca01f05c181d57d238a36c8ce0fa

    • SHA1

      0aca1d58d172c8b3cb8d4facb9c03bfb10d0f5d3

    • SHA256

      9c85fae6b334bb652543d2a82772301f93149491073f3d362f711cab31719f11

    • SHA512

      028441c8f1b610bf9ae78e9a5571b0f498dda809af3b20686bcac023fa9683569dd4df23ab473c03e3bdd15706265cace4599eecf1c5bf5099e68d45abd9de1f

    • SSDEEP

      12582912:Cj3sAitGNU1A9rxtCypOOZsZquwbxvPEvqNKLblJ/i:CjcAitGN+I/ObquGJPpOlJ/

    • Industroyer

      Contains code associated with parsing industroyer's configuration file.

    • Industroyer family

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Event Triggered Execution: Image File Execution Options Injection

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks