General
-
Target
ab8016adf55c33619a92876657b1ee0b59c6df4a95d203756ea71395e7ef5b76
-
Size
669KB
-
Sample
221012-r2be4afghl
-
MD5
6b3ced3247b49068977a4be805854324
-
SHA1
1579d63100e3b44a6b9981dd4c97242b20ceba35
-
SHA256
ab8016adf55c33619a92876657b1ee0b59c6df4a95d203756ea71395e7ef5b76
-
SHA512
7b58806c580b7edb88308076cb182fd9cbc4028b322e9b5688b36d0478b512971970c300c324069239e1b9bce2eb650cbff93d4fa161d89f78839e48d45125c5
-
SSDEEP
12288:QQjNB/yfdkYTZ5soj01t6FKCpoWKmxi89PUos:QQ5NcxT7J84poWKmxB9Q
Behavioral task
behavioral1
Sample
ab8016adf55c33619a92876657b1ee0b59c6df4a95d203756ea71395e7ef5b76.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ab8016adf55c33619a92876657b1ee0b59c6df4a95d203756ea71395e7ef5b76.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
ab8016adf55c33619a92876657b1ee0b59c6df4a95d203756ea71395e7ef5b76
-
Size
669KB
-
MD5
6b3ced3247b49068977a4be805854324
-
SHA1
1579d63100e3b44a6b9981dd4c97242b20ceba35
-
SHA256
ab8016adf55c33619a92876657b1ee0b59c6df4a95d203756ea71395e7ef5b76
-
SHA512
7b58806c580b7edb88308076cb182fd9cbc4028b322e9b5688b36d0478b512971970c300c324069239e1b9bce2eb650cbff93d4fa161d89f78839e48d45125c5
-
SSDEEP
12288:QQjNB/yfdkYTZ5soj01t6FKCpoWKmxi89PUos:QQ5NcxT7J84poWKmxB9Q
Score10/10-
Suspicious use of NtCreateProcessOtherParentProcess
-
Nirsoft
-
Executes dropped EXE
-
Deletes itself
-
Drops desktop.ini file(s)
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-