General

  • Target

    43da221f252d3e0e7c06aa2f21854fed1f01344f81be704e4f0b648f6085527d

  • Size

    2.4MB

  • Sample

    220520-2x541sbbeq

  • MD5

    35da338f4f436aea22b6eb70a1a4f4da

  • SHA1

    7a680d40094954c586afbbc091157023913cee25

  • SHA256

    43da221f252d3e0e7c06aa2f21854fed1f01344f81be704e4f0b648f6085527d

  • SHA512

    d9094284f53b5e940c05604588ab5963712c844a8a7213d3948373a3efeb5187b4193c25957517ffe95724263f914b3993681383d9489da071187102bbb01e53

Malware Config

Targets

    • Target

      43da221f252d3e0e7c06aa2f21854fed1f01344f81be704e4f0b648f6085527d

    • Size

      2.4MB

    • MD5

      35da338f4f436aea22b6eb70a1a4f4da

    • SHA1

      7a680d40094954c586afbbc091157023913cee25

    • SHA256

      43da221f252d3e0e7c06aa2f21854fed1f01344f81be704e4f0b648f6085527d

    • SHA512

      d9094284f53b5e940c05604588ab5963712c844a8a7213d3948373a3efeb5187b4193c25957517ffe95724263f914b3993681383d9489da071187102bbb01e53

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Bootkit

1
T1067

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

4
T1012

System Information Discovery

6
T1082

Tasks