General

  • Target

    e86b39144be1076910ce65ea8ca08b2a9c60b5b4339fc3719ed920f6f0ea7970

  • Size

    3.1MB

  • Sample

    220524-23hwnsbad9

  • MD5

    c93345f06c64162bd97daada1c58e949

  • SHA1

    cbc21acdab66711fdc9a3fe3b6f4e2c0b0aab16d

  • SHA256

    e86b39144be1076910ce65ea8ca08b2a9c60b5b4339fc3719ed920f6f0ea7970

  • SHA512

    97e4651068c510fce8d7826da6b564d591c402e30aa65715e0c729e0122d7a3789f3e969482f0d4a014e9a0f02b705e8341de3b440097be20416480ccb760779

Malware Config

Targets

    • Target

      e86b39144be1076910ce65ea8ca08b2a9c60b5b4339fc3719ed920f6f0ea7970

    • Size

      3.1MB

    • MD5

      c93345f06c64162bd97daada1c58e949

    • SHA1

      cbc21acdab66711fdc9a3fe3b6f4e2c0b0aab16d

    • SHA256

      e86b39144be1076910ce65ea8ca08b2a9c60b5b4339fc3719ed920f6f0ea7970

    • SHA512

      97e4651068c510fce8d7826da6b564d591c402e30aa65715e0c729e0122d7a3789f3e969482f0d4a014e9a0f02b705e8341de3b440097be20416480ccb760779

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks