General

  • Target

    f_000d12

  • Size

    422KB

  • Sample

    230920-hgqvlsgf62

  • MD5

    039b8c951acf9eca3ba1752779540aac

  • SHA1

    baa324545ed43fcdd1eb17a949089378b69069a1

  • SHA256

    0a3f9c54fca6da0147b6b29f0d2d67341ac46d6b5d6116c01a2cbe2d1474b0d1

  • SHA512

    3d741477a82b519c0c369d5ae61f23a9a26edb66ecbd44d03f7d230ef6b00b0692d3344e4dc47e6b91b512db756dcb682baec0bd611bb01aa59d1488baaab5a0

  • SSDEEP

    12288:x0SpccogLq6GvjDuIAiaHj/b0mdFpbYWn39:x0Sp9ogOxvjbXaHjj0mdHJt

Malware Config

Targets

    • Target

      Device/HarddiskVolume3/Users/WissamIH/AppData/Local/Microsoft/Edge/User Data/Default/Cache/Cache_Data/f_000d12

    • Size

      798KB

    • MD5

      90aadf2247149996ae443e2c82af3730

    • SHA1

      050b7eba825412b24e3f02d76d7da5ae97e10502

    • SHA256

      ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a

    • SHA512

      eec32bb82b230dd309c29712e72d4469250e651449e127479d178eddbafd5a46ec8048a753bc2c1a0fdf1dc3ed72a9453ca66fb49cbf0f95a12704e5427182be

    • SSDEEP

      24576:Uj0JJ4p/A4npt3XojeQG5EtzRtO7GvmDguXd:UjoJ4u4zojegylDN

    • FlawedAmmyy RAT

      Remote-access trojan based on leaked code for the Ammyy remote admin software.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks