General

  • Target

    aloha_setup64.exe

  • Size

    113.3MB

  • Sample

    240701-c4h6dsxblm

  • MD5

    b10b30c5efe64450b05a36cb09e667d4

  • SHA1

    0880748ded97b36a6a99bc230a37fbfb37ec1076

  • SHA256

    b87de06d3986e81df492865c9602dfca5bec48e6fdce645e2bfcc0683bf8c780

  • SHA512

    c99833113f8d431fe61fd771cd757a2a9ecbae34b093fe4a28a707fe9cc17126406215b75ca9ecb2ddd7c2fffdf427ecde0a009bdae6e42ffc716371c7ad7d60

  • SSDEEP

    3145728:aaLjDEoCOq816WJAbbjopIcWPUTjVdV/migBDY8m:aaLnEBz8lcj6WcVdV+z5m

Malware Config

Targets

    • Target

      aloha_setup64.exe

    • Size

      113.3MB

    • MD5

      b10b30c5efe64450b05a36cb09e667d4

    • SHA1

      0880748ded97b36a6a99bc230a37fbfb37ec1076

    • SHA256

      b87de06d3986e81df492865c9602dfca5bec48e6fdce645e2bfcc0683bf8c780

    • SHA512

      c99833113f8d431fe61fd771cd757a2a9ecbae34b093fe4a28a707fe9cc17126406215b75ca9ecb2ddd7c2fffdf427ecde0a009bdae6e42ffc716371c7ad7d60

    • SSDEEP

      3145728:aaLjDEoCOq816WJAbbjopIcWPUTjVdV/migBDY8m:aaLnEBz8lcj6WcVdV+z5m

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Component Object Model Hijacking

1
T1546.015

Privilege Escalation

Event Triggered Execution

1
T1546

Component Object Model Hijacking

1
T1546.015

Discovery

Query Registry

1
T1012

Tasks