General

  • Target

    5c83fc892d44cd0bfe1d468404dbc41def9ca511da8e4d77fdea0a774c022ea6

  • Size

    2.6MB

  • Sample

    221128-py86vadf24

  • MD5

    e38d1c34d82fb67b79981a8e113d9d18

  • SHA1

    21b747fb42a79732c3b273f9bc6f1561b211bd0d

  • SHA256

    5c83fc892d44cd0bfe1d468404dbc41def9ca511da8e4d77fdea0a774c022ea6

  • SHA512

    6657cf440f178103a5beab5a257add0ec92661c5d99dd8f0d471977ac819460881f3ca78d3a8b28d9aeced73219f6bff9185d8b0516e5299368263ba5e7c19d4

  • SSDEEP

    49152:3PF/0qaaOycrkwmX4N2hbYiPTUQmJTavSclHj:mraOR4X4NuEmlD

Malware Config

Targets

    • Target

      5c83fc892d44cd0bfe1d468404dbc41def9ca511da8e4d77fdea0a774c022ea6

    • Size

      2.6MB

    • MD5

      e38d1c34d82fb67b79981a8e113d9d18

    • SHA1

      21b747fb42a79732c3b273f9bc6f1561b211bd0d

    • SHA256

      5c83fc892d44cd0bfe1d468404dbc41def9ca511da8e4d77fdea0a774c022ea6

    • SHA512

      6657cf440f178103a5beab5a257add0ec92661c5d99dd8f0d471977ac819460881f3ca78d3a8b28d9aeced73219f6bff9185d8b0516e5299368263ba5e7c19d4

    • SSDEEP

      49152:3PF/0qaaOycrkwmX4N2hbYiPTUQmJTavSclHj:mraOR4X4NuEmlD

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Tasks