General

  • Target

    MegaHack v5.4 SETUP.exe

  • Size

    14.6MB

  • Sample

    250311-wyqsts1ydw

  • MD5

    21f8588ba383393390d76ca642d73183

  • SHA1

    292d500d0ab46c701b33a93284e99a5144078be6

  • SHA256

    85f9e216a24dd777f8e4b7db008128d402355eb93a316fa6ba6c6d8392720a19

  • SHA512

    6426425fcf4ca0ae1ebfbc5b1b91f86a4b9a1bb7a9dc1f648879d3f810c1e5a36d0f3b56effe1f204d0e1847eb93b0ca00fd7c5c2899a8097268f9eddfcbcbd0

  • SSDEEP

    393216:mEGDkj4i79yFTB3HWNmHrjAbh6pBKzd25iFsmF5cISZH:mnA/EFTB3RHyzQxmF5C

Malware Config

Targets

    • Target

      MegaHack v5.4 SETUP.exe

    • Size

      14.6MB

    • MD5

      21f8588ba383393390d76ca642d73183

    • SHA1

      292d500d0ab46c701b33a93284e99a5144078be6

    • SHA256

      85f9e216a24dd777f8e4b7db008128d402355eb93a316fa6ba6c6d8392720a19

    • SHA512

      6426425fcf4ca0ae1ebfbc5b1b91f86a4b9a1bb7a9dc1f648879d3f810c1e5a36d0f3b56effe1f204d0e1847eb93b0ca00fd7c5c2899a8097268f9eddfcbcbd0

    • SSDEEP

      393216:mEGDkj4i79yFTB3HWNmHrjAbh6pBKzd25iFsmF5cISZH:mnA/EFTB3RHyzQxmF5C

    • Guerrilla

      Guerrilla is an Android malware used by the Lemon Group threat actor.

    • Guerrilla family

    • Guerrilla payload

    • Otpstealer

      Otpstealer is an Android SMS Stealer that targets OTP first seen in February 2022.

    • Otpstealer family

    • Otpstealer payload

    • Creates new service(s)

    • Downloads MZ/PE file

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • Possible privilege escalation attempt

    • Stops running service(s)

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks