General

  • Target

    4828328028700672.zip

  • Size

    1.3MB

  • Sample

    210721-4hbbd9nzta

  • MD5

    8b502c0b6699dc9f08c093c37e75686e

  • SHA1

    f3be78f6023d5a2bdc357d4060e004e48e67986c

  • SHA256

    7e37ccb833958400a8319f7880f1d3e25f3a43ead51cdd35ba7cf85722546dfc

  • SHA512

    1462202f6136120ef7d01aaf1d8e94ee286869132dd6bbb15bec9a523c3b6b356011ed0bffc7a505dd5bcdae51bf8443c8ab710c8a17acd297826d17f5585aa7

Score
8/10

Malware Config

Targets

    • Target

      9b355cdb731fd720f58cbfdf7865bb3e276437eaf39eb1c71efb439123d98fb7

    • Size

      1.4MB

    • MD5

      5919fac4b16dfdd3a7e3bb6c17bdc54e

    • SHA1

      9cc538b05d02223826fa21931d9313ec620f337e

    • SHA256

      9b355cdb731fd720f58cbfdf7865bb3e276437eaf39eb1c71efb439123d98fb7

    • SHA512

      74dd6f0b40f7786fbb448d4365ab78589d2d4d231f74fc84961a892f133dda5ae7f46cca3cf1d015530b117436a491b38f0811d9b92e68816e2c74a568b90832

    Score
    8/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Defense Evasion

Modify Registry

1
T1112

Tasks