General

  • Target

    a4e42c6789fe6a2f331c44badc102d301f0131424e0390dc7409c518827d4a6c

  • Size

    26.0MB

  • Sample

    230330-ecltbacd8y

  • MD5

    d0ce85bb7ba897bf8dec7d201b9b87c8

  • SHA1

    f097b3cbff38b15ca2476e3f675e531c92382965

  • SHA256

    a4e42c6789fe6a2f331c44badc102d301f0131424e0390dc7409c518827d4a6c

  • SHA512

    584e771b4c4d3a280060b1b07e25e5915fcd60077222ae26954f20ed7ae50f68a894b073f681740cda70b85d3894eaea1d5ac89658e01ed89500223759462a23

  • SSDEEP

    786432:gjRaLwqLOUjqZNDRLPjqLBeYPWEiR4mEAnG4f3H:gjRakqaNLPmLMu7a/EA9f

Score
7/10

Malware Config

Targets

    • Target

      a4e42c6789fe6a2f331c44badc102d301f0131424e0390dc7409c518827d4a6c

    • Size

      26.0MB

    • MD5

      d0ce85bb7ba897bf8dec7d201b9b87c8

    • SHA1

      f097b3cbff38b15ca2476e3f675e531c92382965

    • SHA256

      a4e42c6789fe6a2f331c44badc102d301f0131424e0390dc7409c518827d4a6c

    • SHA512

      584e771b4c4d3a280060b1b07e25e5915fcd60077222ae26954f20ed7ae50f68a894b073f681740cda70b85d3894eaea1d5ac89658e01ed89500223759462a23

    • SSDEEP

      786432:gjRaLwqLOUjqZNDRLPjqLBeYPWEiR4mEAnG4f3H:gjRakqaNLPmLMu7a/EA9f

    Score
    7/10
    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Tasks