General
-
Target
11892726871.zip
-
Size
32.5MB
-
Sample
230920-kpn24afb9v
-
MD5
3010f3fc61b31fc115a74f5787dc979e
-
SHA1
088118f5fdbc9977a8c7099728195ed330cc4efe
-
SHA256
b7477219089074d0a7c3b8700d94d325e859684ecd6275726cd70bb8587cc853
-
SHA512
11b14d56e3a4179c8e7bcdb9821baa7d9c90a111a0411e8e6c276e8ab7c0617cb3b521cc92ab960b22c5bac8bb6c1444d2f32761d04e1856653c82ade15efd62
-
SSDEEP
786432:16pUU/nTG6wiiege6MjBKdHmFvPZhOqNEVuwj0:16pUf6lieg1dW3ZhOqkTo
Static task
static1
Behavioral task
behavioral1
Sample
8139a6d186626514c2b05a2e2d44b4c7941ad8ce009a79c79919fddaa962b980.msi
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
8139a6d186626514c2b05a2e2d44b4c7941ad8ce009a79c79919fddaa962b980.msi
Resource
win10v2004-20230915-en
Malware Config
Targets
-
-
Target
8139a6d186626514c2b05a2e2d44b4c7941ad8ce009a79c79919fddaa962b980
-
Size
34.8MB
-
MD5
ef22331f4b057a97cf51fc6bf27f0d0c
-
SHA1
c72613236fe04033baacf49e6fbaa7a447bd2c6d
-
SHA256
8139a6d186626514c2b05a2e2d44b4c7941ad8ce009a79c79919fddaa962b980
-
SHA512
72a13bc0412ce78afc023d44197609961b5756e3b1e1c2ec6ea0c91598c41a9dd2fe3949c242d878ac5cbd700c95d61294d7f333aab3e06830c2ceabff9009bd
-
SSDEEP
786432:1eD9unb42u8sn6RtKBiLO61AojwkG17aFlx5IxOIeHiER:gJKVHKBFKAojq1GFa0W
Score8/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Registers COM server for autorun
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1