General

  • Target

    MRPQTGv125.0.exe

  • Size

    7.7MB

  • Sample

    250227-ddekysssc1

  • MD5

    76d9bda14978cfb72485c6032c800fad

  • SHA1

    29a8a065531bcfe7adb0d1a7b7adb78cd336e14c

  • SHA256

    a5dc155fa98ab7edaa456de7fb437b5ba07ce3401416a25a92693a37df1c6300

  • SHA512

    be4c21a721e0586fc15e780d956a80d78a8610180f9eddb7e308e64956bac7c1c121a7740f519b6b8bc5110b81f2237309b3fbbebefb17544d45cb81d6eaa65b

  • SSDEEP

    98304:n4p/sbedo6JBrqU1TzhFc20tWsc20tWFc20tWtc20tWlHlCc20tWuiFmfpP4g:n6doe95FVuVPVHV3HlCVoDpP4g

Malware Config

Targets

    • Target

      MRPQTGv125.0.exe

    • Size

      7.7MB

    • MD5

      76d9bda14978cfb72485c6032c800fad

    • SHA1

      29a8a065531bcfe7adb0d1a7b7adb78cd336e14c

    • SHA256

      a5dc155fa98ab7edaa456de7fb437b5ba07ce3401416a25a92693a37df1c6300

    • SHA512

      be4c21a721e0586fc15e780d956a80d78a8610180f9eddb7e308e64956bac7c1c121a7740f519b6b8bc5110b81f2237309b3fbbebefb17544d45cb81d6eaa65b

    • SSDEEP

      98304:n4p/sbedo6JBrqU1TzhFc20tWsc20tWFc20tWtc20tWlHlCc20tWuiFmfpP4g:n6doe95FVuVPVHV3HlCVoDpP4g

    • Windows security bypass

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies boot configuration data using bcdedit

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks