General

  • Target

    WPS_Setup.exe

  • Size

    246.3MB

  • Sample

    250328-st3p2sxydx

  • MD5

    4b3226ecc1da133e846eebc9af9b915a

  • SHA1

    46403afddb737e4d363446ff617475ae1bbfee21

  • SHA256

    667b472a0672133a75304d8b64972ac18a14949a2fcdfc0fa7a56b319a06a31e

  • SHA512

    4f9ee9d1d106cb3b02e150bd8a625b24cd5e486d62de843c00bd17009c6414c217a9f5c607530b2c88fbddfdea71ad7046634f592e37e9a7b7cdc7afd371bc4c

  • SSDEEP

    6291456:LGDVFnDNs5uOY2MuZHl1aQgAxW/AZH97nlI7Ec:LkPD/3zubzgJsH9b+7b

Malware Config

Targets

    • Target

      WPS_Setup.exe

    • Size

      246.3MB

    • MD5

      4b3226ecc1da133e846eebc9af9b915a

    • SHA1

      46403afddb737e4d363446ff617475ae1bbfee21

    • SHA256

      667b472a0672133a75304d8b64972ac18a14949a2fcdfc0fa7a56b319a06a31e

    • SHA512

      4f9ee9d1d106cb3b02e150bd8a625b24cd5e486d62de843c00bd17009c6414c217a9f5c607530b2c88fbddfdea71ad7046634f592e37e9a7b7cdc7afd371bc4c

    • SSDEEP

      6291456:LGDVFnDNs5uOY2MuZHl1aQgAxW/AZH97nlI7Ec:LkPD/3zubzgJsH9b+7b

    • Blocklisted process makes network request

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks