General

  • Target

    052b40975f878b2592b3f1e297598895cafbbd0083d2e09a3543313aed253565

  • Size

    672KB

  • Sample

    221126-xbk5hafa37

  • MD5

    02666538282fe142ed64560f0d65ce9b

  • SHA1

    20f4a3ef65135415da81263142b3bcefb3523e71

  • SHA256

    052b40975f878b2592b3f1e297598895cafbbd0083d2e09a3543313aed253565

  • SHA512

    c5ab68fa6111080a1bbbcbb9757c1a2407e370ee1171e12a8d4c56628cabb9339e8e64af60e433af201f14d1a7010f70512755b4231effa9428a2efd3cb0d5d7

  • SSDEEP

    12288:6sYvr8mnyUWSlJrAiIamA8cdj4lMT6Xr2cCR:6sYvwIyUpla0mAf

Malware Config

Targets

    • Target

      052b40975f878b2592b3f1e297598895cafbbd0083d2e09a3543313aed253565

    • Size

      672KB

    • MD5

      02666538282fe142ed64560f0d65ce9b

    • SHA1

      20f4a3ef65135415da81263142b3bcefb3523e71

    • SHA256

      052b40975f878b2592b3f1e297598895cafbbd0083d2e09a3543313aed253565

    • SHA512

      c5ab68fa6111080a1bbbcbb9757c1a2407e370ee1171e12a8d4c56628cabb9339e8e64af60e433af201f14d1a7010f70512755b4231effa9428a2efd3cb0d5d7

    • SSDEEP

      12288:6sYvr8mnyUWSlJrAiIamA8cdj4lMT6Xr2cCR:6sYvwIyUpla0mAf

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Impact

Inhibit System Recovery

1
T1490

Tasks