General

  • Target

    2db031a24d4441c8c3883d0f27e6cd18cdb1a9e2581ad09645a63fb8a28806f5

  • Size

    187KB

  • Sample

    221128-flstnacb4v

  • MD5

    b2317effe3c976e9e3b3d6d6f18b06c5

  • SHA1

    d6f04cb40fd3edcf3729c04ec5976f4cac353c0d

  • SHA256

    2db031a24d4441c8c3883d0f27e6cd18cdb1a9e2581ad09645a63fb8a28806f5

  • SHA512

    e6041b7e688c6b66e00383c5c436b84566c768ec433740229b9b572feb287fb341568d66bb1bb87eda45e99b98c810814c3a92bd397ba275ae0a8e5fd953e0b7

  • SSDEEP

    3072:13c1fP4AJJKioaAu0KUrd7LIghJWwKjBktdwAliX+f+chDKUDVdFKyTgCAZtiYp6:hOPjUu09dtEBk/f46RRVdTuzUqBY

Malware Config

Targets

    • Target

      2db031a24d4441c8c3883d0f27e6cd18cdb1a9e2581ad09645a63fb8a28806f5

    • Size

      187KB

    • MD5

      b2317effe3c976e9e3b3d6d6f18b06c5

    • SHA1

      d6f04cb40fd3edcf3729c04ec5976f4cac353c0d

    • SHA256

      2db031a24d4441c8c3883d0f27e6cd18cdb1a9e2581ad09645a63fb8a28806f5

    • SHA512

      e6041b7e688c6b66e00383c5c436b84566c768ec433740229b9b572feb287fb341568d66bb1bb87eda45e99b98c810814c3a92bd397ba275ae0a8e5fd953e0b7

    • SSDEEP

      3072:13c1fP4AJJKioaAu0KUrd7LIghJWwKjBktdwAliX+f+chDKUDVdFKyTgCAZtiYp6:hOPjUu09dtEBk/f46RRVdTuzUqBY

    • Detected phishing page

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Tasks