General
-
Target
d4c4685ed744b3689dbd682513523e3d550e2dcbcb7174269ac72443e1a93046
-
Size
482KB
-
Sample
221124-lmksbsed87
-
MD5
412b8f31383085d1a3ad2e1572bfdab0
-
SHA1
66227d9638ec1d25ad8d52f48a19e7359b184c26
-
SHA256
d4c4685ed744b3689dbd682513523e3d550e2dcbcb7174269ac72443e1a93046
-
SHA512
f241a2c744ae1cc3f47af15d84bfe817fb304fa3abce3ca324e6309b4c8b38a81e0de3414cae397abb635f7cd89f2705e0307be54e370dab52203eff4344a29c
-
SSDEEP
12288:yKPPnRjmgwToyuPDT2rSuhUtT82jZusxPA0oy:tdFwcPDTIio211dA0L
Static task
static1
Behavioral task
behavioral1
Sample
tongliaowang_mg.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
tongliaowang_mg.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
tongliaowang_mg.exe
-
Size
1.2MB
-
MD5
036c2feff8c2b8e27cd76553f68e2b78
-
SHA1
9adef7c5098156a92914e68ee5c631b22edf4c17
-
SHA256
9acdde82155c8afafe1fbefdfc0c576933cc18079fe41a8b1b0ba015ab8566fa
-
SHA512
1e6e3de34c708716705f825c09b904ee9230d60597e6344c0e6236170a8df3d3b5936cdc17bee41b654a30f8e449752b250ba311feecd4ed26aaf7c08a942f32
-
SSDEEP
24576:woiO+FRPFPv6GjcyjFPzaED/EaGLgqPLtCiRG38:wo8iDyRhD/MLDD/
Score9/10-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-