General

  • Target

    1223e1c72603b1b9faaa8a1ef5379626494a94884f8492e5cc710769b7801293

  • Size

    1.7MB

  • Sample

    221125-2l8e1acb93

  • MD5

    23683f65347a524750a70b0371bef989

  • SHA1

    8c13b99456bcd0456b079e7f86d08b1aef85171f

  • SHA256

    1223e1c72603b1b9faaa8a1ef5379626494a94884f8492e5cc710769b7801293

  • SHA512

    b20008bc28f1b369019a2d889b5a8acee5064fb2b0c5358d8010d4ebaf128e18ebb76be287bdbcaaa352b5d9c66e3ea1f2f68b24cb12f74c7d3403cac9479ae0

  • SSDEEP

    49152:E7n9EfqpBdW9/AgdjX8UU2h5DP9Nio0Kmg4MJC2:wzpBIdTjh8n3MJV

Malware Config

Targets

    • Target

      dbwmdjs_dtf.exe

    • Size

      2.4MB

    • MD5

      6513311f73feccd7f1b6475c17e5b531

    • SHA1

      7427ab5cba88979baaf42867828623a97e902455

    • SHA256

      de7c6857fecc81141b3aa01fd9a3f30e0ad63c8352a4265688fa1d74817fffba

    • SHA512

      23f6406e5f8d346e6938bf7f2a8e0f9b910071b5f9d44e1fa5a42787820322f4fa62c15d7a259941671754ba1c1a49b5ad79379419bc8d7943a9bb4ddef2bd99

    • SSDEEP

      49152:Ueixv5gjv451U21sZCg1ch16FRU1EzXIWWCG/RMj:cF2jv47UQoe+RUWbIHCG/R4

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Tasks