General

  • Target

    dc20b38fa55aa52580125dab374b46217136a532c805d7aefcfdbce14d3dfad5

  • Size

    739KB

  • Sample

    221123-vqbs9scf2v

  • MD5

    15d3258e0a610cd824b1f51d9297d640

  • SHA1

    478065a1b38bab5785d8ed5e531ef399bc2633a8

  • SHA256

    dc20b38fa55aa52580125dab374b46217136a532c805d7aefcfdbce14d3dfad5

  • SHA512

    59c1e735e66392accef8d89dcb81d4e9960027c6820ed9e0c848d749738d650e998ab6939520c0df713f7026acf2afa7cabac128fcd98ce4b868c39edc60f1d9

  • SSDEEP

    12288:DSYr8EeBHl8irqPEWGwfz/NQt0lmmFRxRIMmSN3FUoAjc:Dn7kFLrqV7z7m2RxRIMmC3Cc

Score
10/10

Malware Config

Targets

    • Target

      dc20b38fa55aa52580125dab374b46217136a532c805d7aefcfdbce14d3dfad5

    • Size

      739KB

    • MD5

      15d3258e0a610cd824b1f51d9297d640

    • SHA1

      478065a1b38bab5785d8ed5e531ef399bc2633a8

    • SHA256

      dc20b38fa55aa52580125dab374b46217136a532c805d7aefcfdbce14d3dfad5

    • SHA512

      59c1e735e66392accef8d89dcb81d4e9960027c6820ed9e0c848d749738d650e998ab6939520c0df713f7026acf2afa7cabac128fcd98ce4b868c39edc60f1d9

    • SSDEEP

      12288:DSYr8EeBHl8irqPEWGwfz/NQt0lmmFRxRIMmSN3FUoAjc:Dn7kFLrqV7z7m2RxRIMmC3Cc

    Score
    10/10
    • Suspicious use of NtCreateProcessOtherParentProcess

    • Nirsoft

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Drops desktop.ini file(s)

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks