General

  • Target

    de382c48f5f3bff0235d7e614eeade7dc27af2d9c6345546f9b7cc590ab963e7

  • Size

    228KB

  • Sample

    221127-mkfw2aeb5y

  • MD5

    0e551e7947ec8a6b8708434bfa9df531

  • SHA1

    7485c7308666204afb9b29f30aaadc7d09426dd6

  • SHA256

    de382c48f5f3bff0235d7e614eeade7dc27af2d9c6345546f9b7cc590ab963e7

  • SHA512

    8e9b09709ef1859d45c1229e4b3d050b191cf053caaefae6872bfcabdec470f2484720e6244c5803b04f027c8f5afa32230f4a343f803153cc40a587a48a0ff5

  • SSDEEP

    6144:6sFZ1QvEXNYneNpOMKkcbPAMjThvnlanXI:x1Qs+nSOMKjb9hPlEI

Malware Config

Targets

    • Target

      de382c48f5f3bff0235d7e614eeade7dc27af2d9c6345546f9b7cc590ab963e7

    • Size

      228KB

    • MD5

      0e551e7947ec8a6b8708434bfa9df531

    • SHA1

      7485c7308666204afb9b29f30aaadc7d09426dd6

    • SHA256

      de382c48f5f3bff0235d7e614eeade7dc27af2d9c6345546f9b7cc590ab963e7

    • SHA512

      8e9b09709ef1859d45c1229e4b3d050b191cf053caaefae6872bfcabdec470f2484720e6244c5803b04f027c8f5afa32230f4a343f803153cc40a587a48a0ff5

    • SSDEEP

      6144:6sFZ1QvEXNYneNpOMKkcbPAMjThvnlanXI:x1Qs+nSOMKjb9hPlEI

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Registers COM server for autorun

    • Sets DLL path for service in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks