General

  • Target

    d3d70689f088078f80fa0910bef888cac841d63bb08183b1dc7f761102f76d3b

  • Size

    724KB

  • Sample

    221204-mq2exsbc76

  • MD5

    dd0edb94137c8530ff4d36d4e77fba81

  • SHA1

    eb48f3a335919eaa309affadd0106078a3ad8beb

  • SHA256

    d3d70689f088078f80fa0910bef888cac841d63bb08183b1dc7f761102f76d3b

  • SHA512

    1d44422f40576a3af2279b393b71bb53e0e9184d97156a810377cb44f66ec74616425848f3ffa2cf9b5e4e53a8411e0a8362173250acab65a85c3d7211bc1b19

  • SSDEEP

    12288:P+ezwR1kYsk0MgehaYX3XOb09/nhdPoYZIeSWx2oBRUoR:P1Oem0tet3+YxZIeSWx/H

Score
10/10

Malware Config

Targets

    • Target

      d3d70689f088078f80fa0910bef888cac841d63bb08183b1dc7f761102f76d3b

    • Size

      724KB

    • MD5

      dd0edb94137c8530ff4d36d4e77fba81

    • SHA1

      eb48f3a335919eaa309affadd0106078a3ad8beb

    • SHA256

      d3d70689f088078f80fa0910bef888cac841d63bb08183b1dc7f761102f76d3b

    • SHA512

      1d44422f40576a3af2279b393b71bb53e0e9184d97156a810377cb44f66ec74616425848f3ffa2cf9b5e4e53a8411e0a8362173250acab65a85c3d7211bc1b19

    • SSDEEP

      12288:P+ezwR1kYsk0MgehaYX3XOb09/nhdPoYZIeSWx2oBRUoR:P1Oem0tet3+YxZIeSWx/H

    Score
    10/10
    • Suspicious use of NtCreateProcessOtherParentProcess

    • Nirsoft

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Drops desktop.ini file(s)

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v6

Tasks