General

  • Target

    dcf808a4a7896002ea2cf85826c61a27146254f7c8fb6e7253a65d97ebb9b8c9

  • Size

    654KB

  • Sample

    221206-qrlbwafa6s

  • MD5

    3d9261b7476cf3560b7ca76f2c0d49c4

  • SHA1

    6383f958feff7835b461110f199a971dfb908598

  • SHA256

    dcf808a4a7896002ea2cf85826c61a27146254f7c8fb6e7253a65d97ebb9b8c9

  • SHA512

    b5ba292cd53c2e0d186b70a22373a3dc9f99a7b5b8a3caf57adda17bab2792842ce7e55f31b56904c2da24840496e7a91341388412f78ea4b18a808316c9002e

  • SSDEEP

    12288:ENhU4euVxdFqDhwSxlVE7Y1U9Jrd6GfBZPUoq:IO4jfsBD9i9Jrd6Gfm

Score
10/10

Malware Config

Targets

    • Target

      dcf808a4a7896002ea2cf85826c61a27146254f7c8fb6e7253a65d97ebb9b8c9

    • Size

      654KB

    • MD5

      3d9261b7476cf3560b7ca76f2c0d49c4

    • SHA1

      6383f958feff7835b461110f199a971dfb908598

    • SHA256

      dcf808a4a7896002ea2cf85826c61a27146254f7c8fb6e7253a65d97ebb9b8c9

    • SHA512

      b5ba292cd53c2e0d186b70a22373a3dc9f99a7b5b8a3caf57adda17bab2792842ce7e55f31b56904c2da24840496e7a91341388412f78ea4b18a808316c9002e

    • SSDEEP

      12288:ENhU4euVxdFqDhwSxlVE7Y1U9Jrd6GfBZPUoq:IO4jfsBD9i9Jrd6Gfm

    Score
    10/10
    • Suspicious use of NtCreateProcessOtherParentProcess

    • Nirsoft

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Drops desktop.ini file(s)

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v6

Tasks