General

  • Target

    NoteGem2024-75.0.0.355.exe

  • Size

    15.7MB

  • Sample

    250205-k6k2rs1paq

  • MD5

    795a66603495602f2ee4020468326b96

  • SHA1

    1a183bac0daf37f3942c9abcfbd4a022355dcab6

  • SHA256

    55816ec85e4db476aae3d7fd6a34203a5938b9120250eb338729640dc567e220

  • SHA512

    243064a5626a6c1bcff14627a355685de0fafbd34855a886a82a024f0793b40dee5aeaecf181e3646552d4735890d5f05068133b133a4e8dc61601a20ae76b4a

  • SSDEEP

    393216:TD27MrW8LXttexTDNuKYLoz3hBEQmHFjlcYGcID4GC/L8vg7zhCQELstu5E:OQrntex3NuKuC6NmYxGo/toQELyuW

Malware Config

Targets

    • Target

      NoteGem2024-75.0.0.355.exe

    • Size

      15.7MB

    • MD5

      795a66603495602f2ee4020468326b96

    • SHA1

      1a183bac0daf37f3942c9abcfbd4a022355dcab6

    • SHA256

      55816ec85e4db476aae3d7fd6a34203a5938b9120250eb338729640dc567e220

    • SHA512

      243064a5626a6c1bcff14627a355685de0fafbd34855a886a82a024f0793b40dee5aeaecf181e3646552d4735890d5f05068133b133a4e8dc61601a20ae76b4a

    • SSDEEP

      393216:TD27MrW8LXttexTDNuKYLoz3hBEQmHFjlcYGcID4GC/L8vg7zhCQELstu5E:OQrntex3NuKuC6NmYxGo/toQELyuW

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks