General

  • Target

    43468bb82afd1f02af53895238afd514b757f0da00da5ff2bdc91f1eaf8f3e1d

  • Size

    24.6MB

  • Sample

    230329-nle7kagb23

  • MD5

    f5a122c09a3491a9c21b4daa22724620

  • SHA1

    7b8835f74dd3910ec1c1ed09ecf15df7c67a09d8

  • SHA256

    43468bb82afd1f02af53895238afd514b757f0da00da5ff2bdc91f1eaf8f3e1d

  • SHA512

    745495ddfe9d56a990720801bce3b7f288bc23e53a10e529a93155d483ee78ebd2df1e741a4d2111dabee0f9ad2cbbea0b61f5f1481952d9b52f40bfcd67a17a

  • SSDEEP

    786432:/jRaLwqLOUJhZNDRLPjqLBeYPWEiR4mEAnG4f7:/jRakONLPmLMu7a/EA9D

Score
7/10

Malware Config

Targets

    • Target

      43468bb82afd1f02af53895238afd514b757f0da00da5ff2bdc91f1eaf8f3e1d

    • Size

      24.6MB

    • MD5

      f5a122c09a3491a9c21b4daa22724620

    • SHA1

      7b8835f74dd3910ec1c1ed09ecf15df7c67a09d8

    • SHA256

      43468bb82afd1f02af53895238afd514b757f0da00da5ff2bdc91f1eaf8f3e1d

    • SHA512

      745495ddfe9d56a990720801bce3b7f288bc23e53a10e529a93155d483ee78ebd2df1e741a4d2111dabee0f9ad2cbbea0b61f5f1481952d9b52f40bfcd67a17a

    • SSDEEP

      786432:/jRaLwqLOUJhZNDRLPjqLBeYPWEiR4mEAnG4f7:/jRakONLPmLMu7a/EA9D

    Score
    7/10
    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Tasks