General
-
Target
download.jpeg
-
Size
2KB
-
Sample
230510-ra5vmaaa8s
-
MD5
e20e1a9a82d3073f7c1e09f5f48e69ea
-
SHA1
57e07e900e2198ccd8b3c38a2b17f0e7cd885015
-
SHA256
7194b16c7121b03a0ad460c94b5b9274b4112d627ee206c7f4a17623edba05ae
-
SHA512
4d4bfe35daf3fef269c7542267fdfe51c4b8695d80391d6afed5d6faad56c7d483c163f6bc3ac5fd0a60612f0e49398c5d1174aa5e694280e4bdda2da8b7ad8e
Static task
static1
Malware Config
Targets
-
-
Target
download.jpeg
-
Size
2KB
-
MD5
e20e1a9a82d3073f7c1e09f5f48e69ea
-
SHA1
57e07e900e2198ccd8b3c38a2b17f0e7cd885015
-
SHA256
7194b16c7121b03a0ad460c94b5b9274b4112d627ee206c7f4a17623edba05ae
-
SHA512
4d4bfe35daf3fef269c7542267fdfe51c4b8695d80391d6afed5d6faad56c7d483c163f6bc3ac5fd0a60612f0e49398c5d1174aa5e694280e4bdda2da8b7ad8e
-
Adds policy Run key to start application
-
Drops file in Drivers directory
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-