General

  • Target

    65fb211e8ec421819df002261f2cd2736fd93f8369c1f175e0511050501b8a46

  • Size

    437KB

  • Sample

    221125-1rtclahd97

  • MD5

    2c4207a19781add3f79d36e030853c3a

  • SHA1

    5d6281134d0193cf953c7d08ddf6281d4a191d19

  • SHA256

    65fb211e8ec421819df002261f2cd2736fd93f8369c1f175e0511050501b8a46

  • SHA512

    62195ff2f5187d887c801d85a179cc2fa4498338dfd466706ef3e524a4037c50d18b4800a87ff1f3f8322eb8061f26cbd8074aedc7d37d878a3d9f8c8fc9b803

  • SSDEEP

    12288:sify6bcf8Jsjh4KTBcxLrN9wJwzIpYdXXpRWTyqhZtt9CU:siaicfbjhFTBc5rN9wEHEyqhJ8U

Malware Config

Targets

    • Target

      zjgonline_xnz.exe

    • Size

      1.1MB

    • MD5

      1079b4ce26766c1aa3ad0c9ef7b511fd

    • SHA1

      4d44018f19d8df2e6506c797700ae2beeebe36c3

    • SHA256

      114bab184d6c17d2baa0af8e22c303a5dc378285db1fb5b13ad2f042955656b3

    • SHA512

      c8b200853fc46d0edb8fc8ba5548a939db9d5088b8fc687dd82a7776532148b475b2d2b20e8091010b4570636d9bbe9556ad6dcc15b685e76d0405e8d0417afa

    • SSDEEP

      24576:tERKoWHRDflYOMUhw4wIsECJdh8OXeip+wJyG31:tEDWhjyJsOR9JyO

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Tasks