General

  • Target

    R.E.P.O.v0.1.2.Multiplayer.zip

  • Size

    426.1MB

  • Sample

    250326-szlnqaxxb1

  • MD5

    9c50d2b34f72ddf21b7482cf7ec77993

  • SHA1

    9c2ef2191b02d0c4b99d2afd1ec1026fb58b71e7

  • SHA256

    1659eff78f3810441fa302b33e3a12c796cef49b81afc12ef2211daba4d44b69

  • SHA512

    66f1db515e2346b065e17fce150dcb21d450c42867e323a8d3f49a92af4f0c24304148a905b84c9f5be0f4ee6ea68285b0aeed4baf2c37f90e86adf5021376ea

  • SSDEEP

    12582912:P7jq2RmqFMM5zuewwo3KxnIyjTR4wDmIeOS/KAs2JkfBddHREO338gmJzAc:DznuM86Z34wD9N+WBPHREO338gO3

Malware Config

Targets

    • Target

      R.E.P.O.v0.1.2.Multiplayer/R.E.P.O.v0.1.2.Multiplayer/REPO.exe

    • Size

      651KB

    • MD5

      37e2e7e012343ccef500133286fcbf27

    • SHA1

      4b7e66039d04b14ddcfb580a6e6a395ea52222be

    • SHA256

      1643ff9ed131adde7a22363f26d36308b4b4fb8f9ba61e5afce3b6803c5cb302

    • SHA512

      418dcb69e506f42248c00459eb3fa5a576006fead83cb5372e5710a8e95265654c316bbb314e4b8afa69e393a7cdf01219b7e17095d1990ab418f0aed68c687e

    • SSDEEP

      12288:c/744aOD8GVma8Vk2WbYq5qL7Lp4SKpRUzfBI4xa7iKXS:m9aO/Vma72z9KY7BID7iKi

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Detected potential entity reuse from brand STEAM.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks