General

  • Target

    24d4540819bbcc0d89c018e4e3c4d53760b7b5dac0c9789340d02e43fbca3394

  • Size

    233KB

  • Sample

    221123-xqldtaaf9s

  • MD5

    5add62579ee230aa8e4e18bed55612f0

  • SHA1

    21a6534927af3661b9270ce41169ed3d28108f1e

  • SHA256

    24d4540819bbcc0d89c018e4e3c4d53760b7b5dac0c9789340d02e43fbca3394

  • SHA512

    1ad858375a22a89d32f12cf28386b41332c833278d800a95c6dc7f68217e47e6a42fa288fa3bc08d546abbe773d598c464e79a1ec9fbbb0de5fd30607c556f40

  • SSDEEP

    6144:PcAKIGlw7sJ7MSmISlHQXyf9BNvvHFH3i0wvQcxJyn:BKIOwo7iISlHPf93vvZ3rwvQcM

Score
10/10

Malware Config

Targets

    • Target

      24d4540819bbcc0d89c018e4e3c4d53760b7b5dac0c9789340d02e43fbca3394

    • Size

      233KB

    • MD5

      5add62579ee230aa8e4e18bed55612f0

    • SHA1

      21a6534927af3661b9270ce41169ed3d28108f1e

    • SHA256

      24d4540819bbcc0d89c018e4e3c4d53760b7b5dac0c9789340d02e43fbca3394

    • SHA512

      1ad858375a22a89d32f12cf28386b41332c833278d800a95c6dc7f68217e47e6a42fa288fa3bc08d546abbe773d598c464e79a1ec9fbbb0de5fd30607c556f40

    • SSDEEP

      6144:PcAKIGlw7sJ7MSmISlHQXyf9BNvvHFH3i0wvQcxJyn:BKIOwo7iISlHPf93vvZ3rwvQcM

    Score
    10/10
    • Suspicious use of NtCreateProcessOtherParentProcess

    • Nirsoft

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Drops desktop.ini file(s)

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v6

Tasks