General
-
Target
Chrome.msi
-
Size
14.6MB
-
Sample
250221-2rslqstqt5
-
MD5
1ac2f26a8d6237713f6120d9272de355
-
SHA1
20f8d75d976f7af644bf8479ab1e611fe5bea55f
-
SHA256
1924b09ff1e25fe9d39bad70f094766863f366543658627fe94f435b07da6109
-
SHA512
150b5c3693c65d73f9bda9737dd560200abe1c0f95b1abf8e42ea43d80878fef5a39e9410b671ed4af1514e73542931aea96fcf7824067cca886c413672fa444
-
SSDEEP
393216:LBfMDSDSK12jqHzADE/FxGAl81nKJJ3g7xM9a6uAAARWMgyeG/z:5Mg2jUziiFxGAS1UJQNM9aE3RW1yemz
Static task
static1
Behavioral task
behavioral1
Sample
Chrome.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Chrome.msi
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
Chrome.msi
-
Size
14.6MB
-
MD5
1ac2f26a8d6237713f6120d9272de355
-
SHA1
20f8d75d976f7af644bf8479ab1e611fe5bea55f
-
SHA256
1924b09ff1e25fe9d39bad70f094766863f366543658627fe94f435b07da6109
-
SHA512
150b5c3693c65d73f9bda9737dd560200abe1c0f95b1abf8e42ea43d80878fef5a39e9410b671ed4af1514e73542931aea96fcf7824067cca886c413672fa444
-
SSDEEP
393216:LBfMDSDSK12jqHzADE/FxGAl81nKJJ3g7xM9a6uAAARWMgyeG/z:5Mg2jUziiFxGAS1UJQNM9aE3RW1yemz
-
Blackmoon family
-
Detect Blackmoon payload
-
Fatalrat family
-
Fatal Rat payload
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
3Component Object Model Hijacking
1Image File Execution Options Injection
1Installer Packages
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
3Component Object Model Hijacking
1Image File Execution Options Injection
1Installer Packages
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1