General

  • Target

    f4a4d823df9f181439042e62c776f49a801907228264a44766f985ac4166e74e

  • Size

    3.4MB

  • Sample

    230901-w72lpagf4v

  • MD5

    e1e941b059b42eac91aa6d202f25cea4

  • SHA1

    9491962bb2dc1dae6ffd30b444ee307db31869b0

  • SHA256

    f4a4d823df9f181439042e62c776f49a801907228264a44766f985ac4166e74e

  • SHA512

    3e2e28d1d6e50330dfddab02ae52f51d685e3b6c45e9200b9a1ff95f7dcf5188f18a8a64c10bf68969517a59e001895add9602b206e4ce6686c3a54fb2ee98ff

  • SSDEEP

    49152:uUlKbsdQz7kD/PVTmTN9JgrgNTcFJD+UUL3qFgxhOO23TSUh1P65Cfcg/zd:plKYdc0nVacFJRFAhUhU5CfJ

Score
8/10

Malware Config

Targets

    • Target

      f4a4d823df9f181439042e62c776f49a801907228264a44766f985ac4166e74e

    • Size

      3.4MB

    • MD5

      e1e941b059b42eac91aa6d202f25cea4

    • SHA1

      9491962bb2dc1dae6ffd30b444ee307db31869b0

    • SHA256

      f4a4d823df9f181439042e62c776f49a801907228264a44766f985ac4166e74e

    • SHA512

      3e2e28d1d6e50330dfddab02ae52f51d685e3b6c45e9200b9a1ff95f7dcf5188f18a8a64c10bf68969517a59e001895add9602b206e4ce6686c3a54fb2ee98ff

    • SSDEEP

      49152:uUlKbsdQz7kD/PVTmTN9JgrgNTcFJD+UUL3qFgxhOO23TSUh1P65Cfcg/zd:plKYdc0nVacFJRFAhUhU5CfJ

    Score
    8/10
    • Downloads MZ/PE file

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Registers COM server for autorun

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks