General

  • Target

    Speccy64.exe

  • Size

    6.8MB

  • Sample

    210722-sgzbyvpa1a

  • MD5

    a6a655d719159feb5a472ce1d387a366

  • SHA1

    e62769f77cae8b30fbcb58f490f42cd07a24aef6

  • SHA256

    80e5d5327d1376c6a2fa142e8ed7772622f5d2ec29411e000e072e7aa716f004

  • SHA512

    d086bca22c6d1505be8a2c7e1cf0c3747738fccba1af3bf143f84b67b88f888a23f58e751bc58a5d47dee40a6cfe6d9106222776e58b57963474175dfadab57f

Malware Config

Targets

    • Target

      Speccy64.exe

    • Size

      6.8MB

    • MD5

      a6a655d719159feb5a472ce1d387a366

    • SHA1

      e62769f77cae8b30fbcb58f490f42cd07a24aef6

    • SHA256

      80e5d5327d1376c6a2fa142e8ed7772622f5d2ec29411e000e072e7aa716f004

    • SHA512

      d086bca22c6d1505be8a2c7e1cf0c3747738fccba1af3bf143f84b67b88f888a23f58e751bc58a5d47dee40a6cfe6d9106222776e58b57963474175dfadab57f

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

Tasks