General

  • Target

    sample

  • Size

    1KB

  • Sample

    231006-12a9rsgc2z

  • MD5

    79e06b3aaccb91b66795146153924c74

  • SHA1

    109b547884e40e9cd9a6314d7c4dcdcda1511926

  • SHA256

    547aa126a73ed64b64ec9e0342b85b92effdeb97176363ff0a80f97322f0619b

  • SHA512

    a162076f483f23fba4ce1d3652dfce808c730a5849354a22e8b008a7f956ebf8944a286bfe0a584e908e01de47fde4761c7b15d566087d1d164a226e3f1b74a8

Malware Config

Targets

    • Target

      sample

    • Size

      1KB

    • MD5

      79e06b3aaccb91b66795146153924c74

    • SHA1

      109b547884e40e9cd9a6314d7c4dcdcda1511926

    • SHA256

      547aa126a73ed64b64ec9e0342b85b92effdeb97176363ff0a80f97322f0619b

    • SHA512

      a162076f483f23fba4ce1d3652dfce808c730a5849354a22e8b008a7f956ebf8944a286bfe0a584e908e01de47fde4761c7b15d566087d1d164a226e3f1b74a8

    • Modifies WinLogon for persistence

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Possible privilege escalation attempt

    • Executes dropped EXE

    • Modifies file permissions

    • Legitimate hosting services abused for malware hosting/C2

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks