General

  • Target

    setup.exe

  • Size

    29.9MB

  • Sample

    250216-b361dswkaw

  • MD5

    2bf7a91152bef1ad1612024cd9ed291b

  • SHA1

    131e31ceb448532e92cce9be36939f2ffc2b19e8

  • SHA256

    2115a3bcca4d1396f20bccb83edc159181713981fe2258795199ef0e20b48658

  • SHA512

    3db56487d529fde1c977b05bf7b38b15e573acdc7a2554bd4ec7736cbd30cd1b234fa258014efd41f4b1bb86aa81aca76361adf0f99135bdf4ebab9e8009a2fa

  • SSDEEP

    786432:Row/lOW8ClOEl8dPXAflso7wFieDNVQe:vlOW5lzlmPUlsmoNX

Malware Config

Targets

    • Target

      setup.exe

    • Size

      29.9MB

    • MD5

      2bf7a91152bef1ad1612024cd9ed291b

    • SHA1

      131e31ceb448532e92cce9be36939f2ffc2b19e8

    • SHA256

      2115a3bcca4d1396f20bccb83edc159181713981fe2258795199ef0e20b48658

    • SHA512

      3db56487d529fde1c977b05bf7b38b15e573acdc7a2554bd4ec7736cbd30cd1b234fa258014efd41f4b1bb86aa81aca76361adf0f99135bdf4ebab9e8009a2fa

    • SSDEEP

      786432:Row/lOW8ClOEl8dPXAflso7wFieDNVQe:vlOW5lzlmPUlsmoNX

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks