General

  • Target

    472b64fbaf32f375773fed55464eb2259031399b45c69b8381ab5168a3a65932

  • Size

    5.2MB

  • Sample

    220524-2jsxjaade7

  • MD5

    b0a659a40eba8840aa922eb5a757184c

  • SHA1

    ae798c27df3021b4b0d2252d956ac2a451c338c0

  • SHA256

    472b64fbaf32f375773fed55464eb2259031399b45c69b8381ab5168a3a65932

  • SHA512

    e437f6bc4bb40003207a39973205a92a447aa8e6027543559f80ece48d2b981630fff6e1fa6bbde6e0f58964ff5639712888e2e63ba771f74a9827411e197f1e

Malware Config

Targets

    • Target

      472b64fbaf32f375773fed55464eb2259031399b45c69b8381ab5168a3a65932

    • Size

      5.2MB

    • MD5

      b0a659a40eba8840aa922eb5a757184c

    • SHA1

      ae798c27df3021b4b0d2252d956ac2a451c338c0

    • SHA256

      472b64fbaf32f375773fed55464eb2259031399b45c69b8381ab5168a3a65932

    • SHA512

      e437f6bc4bb40003207a39973205a92a447aa8e6027543559f80ece48d2b981630fff6e1fa6bbde6e0f58964ff5639712888e2e63ba771f74a9827411e197f1e

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v6

Tasks