General

  • Target

    261aeadbb84c2a2b693d72ee9a9eb61987c670daf5a03d1e0a78de1f8abc20da

  • Size

    578KB

  • Sample

    220524-s25vdagbg7

  • MD5

    d74c5e0c9d288faa8b3df90a42f1ed67

  • SHA1

    ffb778ad8b96a78da8660af132ed2e7b67131ecc

  • SHA256

    261aeadbb84c2a2b693d72ee9a9eb61987c670daf5a03d1e0a78de1f8abc20da

  • SHA512

    979510f36159a6444e155fb3f26a2e4f436fbde624149974d6f8dadb202d9958d0e68a9a1f5eaeeece61c817ef21fc8e3475b7dde48d8cbeb470b94268683621

Score
8/10

Malware Config

Targets

    • Target

      261aeadbb84c2a2b693d72ee9a9eb61987c670daf5a03d1e0a78de1f8abc20da

    • Size

      578KB

    • MD5

      d74c5e0c9d288faa8b3df90a42f1ed67

    • SHA1

      ffb778ad8b96a78da8660af132ed2e7b67131ecc

    • SHA256

      261aeadbb84c2a2b693d72ee9a9eb61987c670daf5a03d1e0a78de1f8abc20da

    • SHA512

      979510f36159a6444e155fb3f26a2e4f436fbde624149974d6f8dadb202d9958d0e68a9a1f5eaeeece61c817ef21fc8e3475b7dde48d8cbeb470b94268683621

    Score
    8/10
    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Discovery

Query Registry

4
T1012

System Information Discovery

5
T1082

Peripheral Device Discovery

3
T1120

Tasks