General
-
Target
R.E.P.O.v0.1.2.Multiplayer.zip
-
Size
426.1MB
-
Sample
250326-szlnqaxxb1
-
MD5
9c50d2b34f72ddf21b7482cf7ec77993
-
SHA1
9c2ef2191b02d0c4b99d2afd1ec1026fb58b71e7
-
SHA256
1659eff78f3810441fa302b33e3a12c796cef49b81afc12ef2211daba4d44b69
-
SHA512
66f1db515e2346b065e17fce150dcb21d450c42867e323a8d3f49a92af4f0c24304148a905b84c9f5be0f4ee6ea68285b0aeed4baf2c37f90e86adf5021376ea
-
SSDEEP
12582912:P7jq2RmqFMM5zuewwo3KxnIyjTR4wDmIeOS/KAs2JkfBddHREO338gmJzAc:DznuM86Z34wD9N+WBPHREO338gO3
Behavioral task
behavioral1
Sample
R.E.P.O.v0.1.2.Multiplayer/R.E.P.O.v0.1.2.Multiplayer/REPO.exe
Resource
win10ltsc2021-20250314-es
Behavioral task
behavioral2
Sample
R.E.P.O.v0.1.2.Multiplayer/R.E.P.O.v0.1.2.Multiplayer/REPO.exe
Resource
win11-20250313-es
Malware Config
Targets
-
-
Target
R.E.P.O.v0.1.2.Multiplayer/R.E.P.O.v0.1.2.Multiplayer/REPO.exe
-
Size
651KB
-
MD5
37e2e7e012343ccef500133286fcbf27
-
SHA1
4b7e66039d04b14ddcfb580a6e6a395ea52222be
-
SHA256
1643ff9ed131adde7a22363f26d36308b4b4fb8f9ba61e5afce3b6803c5cb302
-
SHA512
418dcb69e506f42248c00459eb3fa5a576006fead83cb5372e5710a8e95265654c316bbb314e4b8afa69e393a7cdf01219b7e17095d1990ab418f0aed68c687e
-
SSDEEP
12288:c/744aOD8GVma8Vk2WbYq5qL7Lp4SKpRUzfBI4xa7iKXS:m9aO/Vma72z9KY7BID7iKi
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Modify Registry
2Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1