Overview
overview
10Static
static
56GZ4B0XxJP...fg.exe
windows7-x64
36GZ4B0XxJP...fg.exe
windows10-2004-x64
16GZ4B0XxJP...ol.exe
windows7-x64
106GZ4B0XxJP...ol.exe
windows10-2004-x64
56GZ4B0XxJP...gs.vbs
windows7-x64
36GZ4B0XxJP...gs.vbs
windows10-2004-x64
16GZ4B0XxJP...ER.bat
windows7-x64
36GZ4B0XxJP...ER.bat
windows10-2004-x64
36GZ4B0XxJP...IO.exe
windows7-x64
76GZ4B0XxJP...IO.exe
windows10-2004-x64
76GZ4B0XxJP...up.exe
windows7-x64
76GZ4B0XxJP...up.exe
windows10-2004-x64
7General
-
Target
6GZ4B0XxJPfg.rar
-
Size
59.7MB
-
Sample
250220-rk8n9swncx
-
MD5
7d87d1c1a6e39633e55a0d83d40f382f
-
SHA1
bf425e0d7bf24dba8943db09643f5d3ae371fe8a
-
SHA256
8dd3f68af9ccbcf347e5b319909fd972e6c29d3c9859b2ba966159ba0ec51d87
-
SHA512
5d4bbde0684e4388820a75ce86b947bea696e8565cbd2c935de5aa2f7fcdf06c129fceaed9592f06ba9c58a9636fc5eec5945026d49a39261885707ad6ef7cb1
-
SSDEEP
1572864:/gl3lXu2ArW3EZJzwCQyojzAxKX2WDHeZwoO9Y:/gPXulC3QhzHoqKXz7eW/Y
Behavioral task
behavioral1
Sample
6GZ4B0XxJPfg/6GZ4B0XxJPfg.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6GZ4B0XxJPfg/6GZ4B0XxJPfg.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
6GZ4B0XxJPfg/Requirement/Defender Control/Defender Control.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
6GZ4B0XxJPfg/Requirement/Defender Control/Defender Control.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
6GZ4B0XxJPfg/Requirement/Defender Control/Defender_Settings.vbs
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
6GZ4B0XxJPfg/Requirement/Defender Control/Defender_Settings.vbs
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
6GZ4B0XxJPfg/Requirement/MAC CHANGER.bat
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
6GZ4B0XxJPfg/Requirement/MAC CHANGER.bat
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
6GZ4B0XxJPfg/Requirement/Visual C++ AIO.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
6GZ4B0XxJPfg/Requirement/Visual C++ AIO.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
6GZ4B0XxJPfg/Requirement/dxwebsetup.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
6GZ4B0XxJPfg/Requirement/dxwebsetup.exe
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
6GZ4B0XxJPfg/6GZ4B0XxJPfg.exe
-
Size
31.8MB
-
MD5
3942c35ddcbd712138286422c13a89cf
-
SHA1
4d5c25447252e4ac03a0c0c414dd154b8e19fc86
-
SHA256
4b296d3eaa1e73ae9101209bbc5de413bc33e697fbe90a5c5d3f42f7e5a82621
-
SHA512
b0ccd973f4b0c53639988e8a4406ead6a95687ca37453721ab87e8d2420ac951b5541b9f60f966e1a5d395e5553a64952299b60f98928feb17cd00ed222e2602
-
SSDEEP
786432:4Y3qYvw3l4K8oC/4Bfxv/vmIXmLQFzI9MWCj:WY+4GrxXL7zcMLj
Score3/10 -
-
-
Target
6GZ4B0XxJPfg/Requirement/Defender Control/Defender Control.exe
-
Size
447KB
-
MD5
58008524a6473bdf86c1040a9a9e39c3
-
SHA1
cb704d2e8df80fd3500a5b817966dc262d80ddb8
-
SHA256
1ef6c1a4dfdc39b63bfe650ca81ab89510de6c0d3d7c608ac5be80033e559326
-
SHA512
8cf492584303523bf6cdfeb6b1b779ee44471c91e759ce32fd4849547b6245d4ed86af5b38d1c6979729a77f312ba91c48207a332ae1589a6e25de67ffb96c31
-
SSDEEP
6144:Vzv+kSn74iCmfianQGDM3OXTWRDy9GYQDUmJFXIXHrsUBnBTF8JJCYrYNsQJzfgu:Vzcn7EanlQiWtYhmJFSwUBLcQZfgiD
Score10/10-
Modifies security service
-
Windows security modification
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
-
-
Target
6GZ4B0XxJPfg/Requirement/Defender Control/Defender_Settings.vbs
-
Size
313B
-
MD5
b0bf0a477bcca312021177572311e666
-
SHA1
ea77332d7779938ae8e92ad35d6dea4f4be37a92
-
SHA256
af42a17d428c8e9d6f4a6d3393ec268f4d12bbfd01a897d87275482a45c847e9
-
SHA512
09366608f2670d2eb0e8ddcacd081a7b2d7b680c4cdd02494d08821dbdf17595b30e88f6ce0888591592e7caa422414a895846a268fd63e8243074972c9f52d8
Score3/10 -
-
-
Target
6GZ4B0XxJPfg/Requirement/MAC CHANGER.bat
-
Size
2KB
-
MD5
86630f471a1c7f40e8494347f9ab8249
-
SHA1
10a2139adfb884f01799de89bf9b9ccb2a8bb460
-
SHA256
c15faade0e71acd4abcb60a7e9f3f002a46d3d47bd294f7b12d811c871d1292c
-
SHA512
666fe7866c2bedc78aad081bddf7e4dc8a9038b173527dc9464dd9c0776314a8c3e1ec7f4d0f34aff0d946b94ed1178a5c665d79173d1bfe0a0a611f6af65369
Score3/10 -
-
-
Target
6GZ4B0XxJPfg/Requirement/Visual C++ AIO.exe
-
Size
27.7MB
-
MD5
91e79e0543a28b0003ba1801a5132830
-
SHA1
00caec42c200e33c87a15b9ae105a977b3a1edde
-
SHA256
de0f71175828f9214494a6f6612bb653d0c023875b8b544556bff84ee4953d96
-
SHA512
786775f33a1b2efc06604248261503012ae457a8805f2c1d6fdfc3f189257db116acf13b2420963c68951718af1b957cd8a1a612ba5fc7ac9bb6ddafb1831c4f
-
SSDEEP
393216:rV8PuFzZgmwO6R2AIEd3A3Pr9J6SrAYVLMnbu7vB5uBlwBR3i4VZssb3piHVm7/N:x6u6IA/dwjqYVLvuBmBRS7e3MgTN
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
-
-
Target
6GZ4B0XxJPfg/Requirement/dxwebsetup.exe
-
Size
288KB
-
MD5
2cbd6ad183914a0c554f0739069e77d7
-
SHA1
7bf35f2afca666078db35ca95130beb2e3782212
-
SHA256
2cf71d098c608c56e07f4655855a886c3102553f648df88458df616b26fd612f
-
SHA512
ff1af2d2a883865f2412dddcd68006d1907a719fe833319c833f897c93ee750bac494c0991170dc1cf726b3f0406707daa361d06568cd610eeb4ed1d9c0fbb10
-
SSDEEP
6144:kWK8fc2liXmrLxcdRDLiH1vVRGVOhMp421/7YQV:VcvgLARDI1KIOzO0
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1