General
-
Target
PassatHook.exe
-
Size
14.7MB
-
Sample
250328-xxc11szxbt
-
MD5
eafb67ed7734f5561c709b64e6e36b8f
-
SHA1
d7d5859993759ef0079a92506a9eed6a11fbdf48
-
SHA256
1c1e61fa3ca755e7f1616263bcf948ce2a22ae9d01dac95d4093f59ec5e42ce3
-
SHA512
f152eab4c9b4d80ccfb9d9aea316838ea2f10376d681b1371dee02484fa68e8949a05c5fd6536f21939f036bd70cc179e364099d59f3aa3645bb8534b8f2c692
-
SSDEEP
393216:l++AaWnPOESRAc5OKC4JLXH9ip87knYOwPecB:HtQtgk4JrYp8gYOUf
Static task
static1
Behavioral task
behavioral1
Sample
PassatHook.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PassatHook.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
PassatHook.exe
-
Size
14.7MB
-
MD5
eafb67ed7734f5561c709b64e6e36b8f
-
SHA1
d7d5859993759ef0079a92506a9eed6a11fbdf48
-
SHA256
1c1e61fa3ca755e7f1616263bcf948ce2a22ae9d01dac95d4093f59ec5e42ce3
-
SHA512
f152eab4c9b4d80ccfb9d9aea316838ea2f10376d681b1371dee02484fa68e8949a05c5fd6536f21939f036bd70cc179e364099d59f3aa3645bb8534b8f2c692
-
SSDEEP
393216:l++AaWnPOESRAc5OKC4JLXH9ip87knYOwPecB:HtQtgk4JrYp8gYOUf
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Component Object Model Hijacking
1Pre-OS Boot
1Bootkit
1Defense Evasion
Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1