General

  • Target

    11e8ea27eca5e07f2229a040ea4ce69271232a727ad0c097ae654538202352d9

  • Size

    596KB

  • Sample

    221126-2s2wssee9s

  • MD5

    dda88df5ff38aff49f7e1b501467e3c4

  • SHA1

    3edba0eb8637cc41ab629cb5f94e7857234515f7

  • SHA256

    11e8ea27eca5e07f2229a040ea4ce69271232a727ad0c097ae654538202352d9

  • SHA512

    35695eb8722eb0d4f66517df221629e1844725a46e663cd50d9aee4f05ace88a5e9ca299c374ceca777167a962f9dfad92076a20301d746b883a06cec3553ee6

  • SSDEEP

    12288:xxo7Y+myAvOXHAhxYhPnwENNOCMy8cqkt89GNA:xD+0CHAhEDNOjjcJ69GNA

Malware Config

Targets

    • Target

      7h365_txl.exe

    • Size

      1.8MB

    • MD5

      d846438cdf02c1c79c59dfd78517ece7

    • SHA1

      e1cff5521b8f43a0702e3e95e4c0cffd6afe2c52

    • SHA256

      6ea232d0e63293449e7150238d0d130c78d21075f2c3e630f2e5e5d07457e2ed

    • SHA512

      a7f1cdbe62e4ba266dca19fc6baf87a60a78e6ade5e1c1bc416e248a215ca8c382b888a92fe2cedad84163d417581d36b938ce1baa3c341c45388eb6ff25f530

    • SSDEEP

      24576:ZPJO3jXzKoMMSQdbML7/qcr+6iPLVqbJPOSFyHoA5+U/KD3T9t0kjYTT6F1G3a:ZP0Qt7W6i4b91FIoAYU/O3Hp

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Tasks