General

  • Target

    d4c4685ed744b3689dbd682513523e3d550e2dcbcb7174269ac72443e1a93046

  • Size

    482KB

  • Sample

    221124-lmksbsed87

  • MD5

    412b8f31383085d1a3ad2e1572bfdab0

  • SHA1

    66227d9638ec1d25ad8d52f48a19e7359b184c26

  • SHA256

    d4c4685ed744b3689dbd682513523e3d550e2dcbcb7174269ac72443e1a93046

  • SHA512

    f241a2c744ae1cc3f47af15d84bfe817fb304fa3abce3ca324e6309b4c8b38a81e0de3414cae397abb635f7cd89f2705e0307be54e370dab52203eff4344a29c

  • SSDEEP

    12288:yKPPnRjmgwToyuPDT2rSuhUtT82jZusxPA0oy:tdFwcPDTIio211dA0L

Malware Config

Targets

    • Target

      tongliaowang_mg.exe

    • Size

      1.2MB

    • MD5

      036c2feff8c2b8e27cd76553f68e2b78

    • SHA1

      9adef7c5098156a92914e68ee5c631b22edf4c17

    • SHA256

      9acdde82155c8afafe1fbefdfc0c576933cc18079fe41a8b1b0ba015ab8566fa

    • SHA512

      1e6e3de34c708716705f825c09b904ee9230d60597e6344c0e6236170a8df3d3b5936cdc17bee41b654a30f8e449752b250ba311feecd4ed26aaf7c08a942f32

    • SSDEEP

      24576:woiO+FRPFPv6GjcyjFPzaED/EaGLgqPLtCiRG38:wo8iDyRhD/MLDD/

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v6

Tasks