General
-
Target
IDA 9.0.240925 Pro [FileCR].zip
-
Size
718.9MB
-
Sample
250204-xqhb6axmev
-
MD5
9eb74d8e31812d9a6e556c72b9538398
-
SHA1
33b60f95a96bd859e482fea6beef94ed5216f061
-
SHA256
e033b342f78f33dcb7c77a06fc1256e5e3da3aff86efd8eb2bcb1a562f14ed84
-
SHA512
55b666a7e2abc06122ffa087611c4830b1c051ff9a699151a8f00b5b77c2402a0bfd0131597dfab1e0a18bcda715fc454e01f7a1d2daaf90e9b94c3a34e37d71
-
SSDEEP
12582912:TT9NkQjLV/1Cai8TMcGZ5X2Oh0Kw8uz7OXf16QoeLEJsLO2rHhNhLyoNp:TTsoVtC3Em3X2VKwidUk1R1NR9p
Static task
static1
Behavioral task
behavioral1
Sample
IDA 9.0.240925 Pro [FileCR].zip
Resource
win10ltsc2021-20250128-en
Malware Config
Targets
-
-
Target
IDA 9.0.240925 Pro [FileCR].zip
-
Size
718.9MB
-
MD5
9eb74d8e31812d9a6e556c72b9538398
-
SHA1
33b60f95a96bd859e482fea6beef94ed5216f061
-
SHA256
e033b342f78f33dcb7c77a06fc1256e5e3da3aff86efd8eb2bcb1a562f14ed84
-
SHA512
55b666a7e2abc06122ffa087611c4830b1c051ff9a699151a8f00b5b77c2402a0bfd0131597dfab1e0a18bcda715fc454e01f7a1d2daaf90e9b94c3a34e37d71
-
SSDEEP
12582912:TT9NkQjLV/1Cai8TMcGZ5X2Oh0Kw8uz7OXf16QoeLEJsLO2rHhNhLyoNp:TTsoVtC3Em3X2VKwidUk1R1NR9p
-
Industroyer
Contains code associated with parsing industroyer's configuration file.
-
Industroyer family
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1