General

  • Target

    release.exe

  • Size

    99.1MB

  • Sample

    250204-w1mh7awlbs

  • MD5

    1e2b28d4b45b8eb708fe85acbc3e1bc7

  • SHA1

    3f12cb10adf03efd6b94239943441841f79147bf

  • SHA256

    e5664ebac656206a3b6abc4610f6c2aae275e51e420d38fe6dbd04535105a884

  • SHA512

    a913a7e90eb95522f3c4e6aaa52aa1a62c878af5910ed6999576f864b7d6da2730e19790741268b6a8497968966022fe076cbd5eda505cd55422b9c595ee12ef

  • SSDEEP

    393216:WYsmngFeXs0Wh+AMIoDYlUbgWXwfyDrfXJUDDQjs2IXf:gmNyh+u8Yl+gWXJDrfZiDQQ2

Malware Config

Targets

    • Target

      release.exe

    • Size

      99.1MB

    • MD5

      1e2b28d4b45b8eb708fe85acbc3e1bc7

    • SHA1

      3f12cb10adf03efd6b94239943441841f79147bf

    • SHA256

      e5664ebac656206a3b6abc4610f6c2aae275e51e420d38fe6dbd04535105a884

    • SHA512

      a913a7e90eb95522f3c4e6aaa52aa1a62c878af5910ed6999576f864b7d6da2730e19790741268b6a8497968966022fe076cbd5eda505cd55422b9c595ee12ef

    • SSDEEP

      393216:WYsmngFeXs0Wh+AMIoDYlUbgWXwfyDrfXJUDDQjs2IXf:gmNyh+u8Yl+gWXJDrfZiDQQ2

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Probable phishing domain

MITRE ATT&CK Enterprise v15

Tasks