General

  • Target

    1876358d802ba9302a612ea85f1761bd3e885b4528e26a1f735617520bbc1c1f

  • Size

    4.9MB

  • Sample

    220524-3jy9zsbfh9

  • MD5

    cc23b55bb153f037f69c4d37df0f0b92

  • SHA1

    60a5a0033f40380fab71d4af93601e431d157e01

  • SHA256

    1876358d802ba9302a612ea85f1761bd3e885b4528e26a1f735617520bbc1c1f

  • SHA512

    d56fd352e417e00a71d19f9a46b43398cf7640b59970759baf502a81e714a06f3d826a67982cd38200466d84962e1819c3f54208603578764b80b1626128f5e8

Score
8/10

Malware Config

Targets

    • Target

      1876358d802ba9302a612ea85f1761bd3e885b4528e26a1f735617520bbc1c1f

    • Size

      4.9MB

    • MD5

      cc23b55bb153f037f69c4d37df0f0b92

    • SHA1

      60a5a0033f40380fab71d4af93601e431d157e01

    • SHA256

      1876358d802ba9302a612ea85f1761bd3e885b4528e26a1f735617520bbc1c1f

    • SHA512

      d56fd352e417e00a71d19f9a46b43398cf7640b59970759baf502a81e714a06f3d826a67982cd38200466d84962e1819c3f54208603578764b80b1626128f5e8

    Score
    8/10
    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks