General
-
Target
FREEEEEEE
-
Size
3KB
-
Sample
230507-yb1qmahd4y
-
MD5
b67b3eaa163ae4edf089f487e40b351e
-
SHA1
c57eee377f00bcbaf84b2cc3102a725daadbf8c7
-
SHA256
9d059fe6ada9d5860401ea028e40dbf231b9e41f3f88a7d0d04136214c596a96
-
SHA512
c4f5af4346f87e6e3454b889e53fd0a7b54e2d3fdadc7a71ba9f50f4ac88c1aee6563a745282059a94218926b7861d8cd0f88ea30ef351b319fabd6d286bfb71
Static task
static1
Behavioral task
behavioral1
Sample
FREEEEEEE
Resource
win10-20230220-en
Malware Config
Targets
-
-
Target
FREEEEEEE
-
Size
3KB
-
MD5
b67b3eaa163ae4edf089f487e40b351e
-
SHA1
c57eee377f00bcbaf84b2cc3102a725daadbf8c7
-
SHA256
9d059fe6ada9d5860401ea028e40dbf231b9e41f3f88a7d0d04136214c596a96
-
SHA512
c4f5af4346f87e6e3454b889e53fd0a7b54e2d3fdadc7a71ba9f50f4ac88c1aee6563a745282059a94218926b7861d8cd0f88ea30ef351b319fabd6d286bfb71
Score8/10-
Downloads MZ/PE file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-