General

  • Target

    b615e085031fb93ff21a0b0e743cc92e0e8f4dd4b58c02e557ed0ad116bd1784

  • Size

    1.6MB

  • Sample

    220525-appzaaggel

  • MD5

    bf60b20442eb074a2b0b0b9f410aa40b

  • SHA1

    679f886dc3613225c9238eb36669402f60f1ae85

  • SHA256

    b615e085031fb93ff21a0b0e743cc92e0e8f4dd4b58c02e557ed0ad116bd1784

  • SHA512

    81e669cfb677b25116d45b4f0e6341c611a3d56ee46cd019d6e5d8ef9daaf1f4cfeb0e4997032128b1af99ef93f9b81f4cd0026e5a11fdab5d73e4d98801c8b5

Malware Config

Targets

    • Target

      b615e085031fb93ff21a0b0e743cc92e0e8f4dd4b58c02e557ed0ad116bd1784

    • Size

      1.6MB

    • MD5

      bf60b20442eb074a2b0b0b9f410aa40b

    • SHA1

      679f886dc3613225c9238eb36669402f60f1ae85

    • SHA256

      b615e085031fb93ff21a0b0e743cc92e0e8f4dd4b58c02e557ed0ad116bd1784

    • SHA512

      81e669cfb677b25116d45b4f0e6341c611a3d56ee46cd019d6e5d8ef9daaf1f4cfeb0e4997032128b1af99ef93f9b81f4cd0026e5a11fdab5d73e4d98801c8b5

    • suricata: ET MALWARE Possible Windows executable sent when remote host claims to send a Text File

      suricata: ET MALWARE Possible Windows executable sent when remote host claims to send a Text File

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Discovery

System Information Discovery

1
T1082

Tasks