General
-
Target
ce2075f76a21e2a535681e2ad09c4d4d646e600e0491bb4f3725f6e0634fdab7
-
Size
13.2MB
-
Sample
250328-k87njstzat
-
MD5
b82a96209cd410e9773996a9cab7da6b
-
SHA1
e88d7fa44705d9900b591782fdcff209bebca98e
-
SHA256
ce2075f76a21e2a535681e2ad09c4d4d646e600e0491bb4f3725f6e0634fdab7
-
SHA512
cee235e3a5d5c6659b715067be50974c1596dfdce9382162d770db5de26e2160f17e6e889ae4f33c985364e2277ae8b0a318122aba9c81f865563a662f3e3793
-
SSDEEP
393216:oCHuozSQ2i6SyBBDFDsxOQ511AP9+2XS9LT:ofQ2dBBDFA0Q51KM2XKLT
Static task
static1
Behavioral task
behavioral1
Sample
Chromestup.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Chromestup.msi
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
Chromestup.msi
-
Size
14.5MB
-
MD5
d2f1ff0fca1a5d50f371b849df0ff604
-
SHA1
edcc7fce9a61e3ca13a87c694a50d9810f83e89b
-
SHA256
f71845af2465c505c857f622e78e266553c1f0a578c321cca70eca0d676e3512
-
SHA512
3e1a7c1eee079b0094a42e6fd00d9b896798d7d535f21fc79254c489c0f8323a7d5ecf75b66556e2a3f9d7f2fc6ec689bcb8c1a1dfb829f07afecad37175dd7a
-
SSDEEP
393216:6BfMD+F9vscR4cMMmYCb1HvXODuuXPfott+I5MF9:uMdcMTb1Hv+CuXPw8I5g9
-
Blackmoon family
-
Detect Blackmoon payload
-
Fatalrat family
-
Fatal Rat payload
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
3Component Object Model Hijacking
1Image File Execution Options Injection
1Installer Packages
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
3Component Object Model Hijacking
1Image File Execution Options Injection
1Installer Packages
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1