General

  • Target

    1c1e78e8633a5e4408bbd5d3c641ff2af2a457084e6a19e2c4fc5a196867e862

  • Size

    7.4MB

  • Sample

    220525-bma8saead6

  • MD5

    12b95b6050d0cacd4a28cd8adc49e832

  • SHA1

    e2b9443ec49eb4907fe4fb7c3ed2da3c6d0ab810

  • SHA256

    1c1e78e8633a5e4408bbd5d3c641ff2af2a457084e6a19e2c4fc5a196867e862

  • SHA512

    f07eb61343a3afede343cc9f6583fcb7b6e77e7819a34af03a8a677aeb4f52285cda890cf80c9b442e811ddf696d6715b2eb1596cc162710eb884d873f2163af

Malware Config

Targets

    • Target

      1c1e78e8633a5e4408bbd5d3c641ff2af2a457084e6a19e2c4fc5a196867e862

    • Size

      7.4MB

    • MD5

      12b95b6050d0cacd4a28cd8adc49e832

    • SHA1

      e2b9443ec49eb4907fe4fb7c3ed2da3c6d0ab810

    • SHA256

      1c1e78e8633a5e4408bbd5d3c641ff2af2a457084e6a19e2c4fc5a196867e862

    • SHA512

      f07eb61343a3afede343cc9f6583fcb7b6e77e7819a34af03a8a677aeb4f52285cda890cf80c9b442e811ddf696d6715b2eb1596cc162710eb884d873f2163af

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v6

Tasks