General
-
Target
d3d70689f088078f80fa0910bef888cac841d63bb08183b1dc7f761102f76d3b
-
Size
724KB
-
Sample
221204-mq2exsbc76
-
MD5
dd0edb94137c8530ff4d36d4e77fba81
-
SHA1
eb48f3a335919eaa309affadd0106078a3ad8beb
-
SHA256
d3d70689f088078f80fa0910bef888cac841d63bb08183b1dc7f761102f76d3b
-
SHA512
1d44422f40576a3af2279b393b71bb53e0e9184d97156a810377cb44f66ec74616425848f3ffa2cf9b5e4e53a8411e0a8362173250acab65a85c3d7211bc1b19
-
SSDEEP
12288:P+ezwR1kYsk0MgehaYX3XOb09/nhdPoYZIeSWx2oBRUoR:P1Oem0tet3+YxZIeSWx/H
Behavioral task
behavioral1
Sample
d3d70689f088078f80fa0910bef888cac841d63bb08183b1dc7f761102f76d3b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d3d70689f088078f80fa0910bef888cac841d63bb08183b1dc7f761102f76d3b.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
d3d70689f088078f80fa0910bef888cac841d63bb08183b1dc7f761102f76d3b
-
Size
724KB
-
MD5
dd0edb94137c8530ff4d36d4e77fba81
-
SHA1
eb48f3a335919eaa309affadd0106078a3ad8beb
-
SHA256
d3d70689f088078f80fa0910bef888cac841d63bb08183b1dc7f761102f76d3b
-
SHA512
1d44422f40576a3af2279b393b71bb53e0e9184d97156a810377cb44f66ec74616425848f3ffa2cf9b5e4e53a8411e0a8362173250acab65a85c3d7211bc1b19
-
SSDEEP
12288:P+ezwR1kYsk0MgehaYX3XOb09/nhdPoYZIeSWx2oBRUoR:P1Oem0tet3+YxZIeSWx/H
Score10/10-
Suspicious use of NtCreateProcessOtherParentProcess
-
Nirsoft
-
Executes dropped EXE
-
Deletes itself
-
Drops desktop.ini file(s)
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-