General

  • Target

    winservices.exe

  • Size

    2.2MB

  • Sample

    210227-cag1dpbtmj

  • MD5

    3e9161c04f171db253b980d547692732

  • SHA1

    a0dea436d8b0543d6ce52b9267bfbc25b698a3f1

  • SHA256

    ed96096ac258b000b243394cdd390bf8bdcc5c4d5e22610e6837902051bdc3a1

  • SHA512

    2d1e08186527aa65e269efb1f55f08b9f244e41791729dd1f8359e8b270cf39489bf4e12ce565b0f30512ae03e4857c0e936a454a57fbee612038a06255ea682

Malware Config

Targets

    • Target

      winservices.exe

    • Size

      2.2MB

    • MD5

      3e9161c04f171db253b980d547692732

    • SHA1

      a0dea436d8b0543d6ce52b9267bfbc25b698a3f1

    • SHA256

      ed96096ac258b000b243394cdd390bf8bdcc5c4d5e22610e6837902051bdc3a1

    • SHA512

      2d1e08186527aa65e269efb1f55f08b9f244e41791729dd1f8359e8b270cf39489bf4e12ce565b0f30512ae03e4857c0e936a454a57fbee612038a06255ea682

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Bootkit

1
T1067

Tasks