General
-
Target
sample
-
Size
1KB
-
Sample
231006-12a9rsgc2z
-
MD5
79e06b3aaccb91b66795146153924c74
-
SHA1
109b547884e40e9cd9a6314d7c4dcdcda1511926
-
SHA256
547aa126a73ed64b64ec9e0342b85b92effdeb97176363ff0a80f97322f0619b
-
SHA512
a162076f483f23fba4ce1d3652dfce808c730a5849354a22e8b008a7f956ebf8944a286bfe0a584e908e01de47fde4761c7b15d566087d1d164a226e3f1b74a8
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win10-20230915-en
Malware Config
Targets
-
-
Target
sample
-
Size
1KB
-
MD5
79e06b3aaccb91b66795146153924c74
-
SHA1
109b547884e40e9cd9a6314d7c4dcdcda1511926
-
SHA256
547aa126a73ed64b64ec9e0342b85b92effdeb97176363ff0a80f97322f0619b
-
SHA512
a162076f483f23fba4ce1d3652dfce808c730a5849354a22e8b008a7f956ebf8944a286bfe0a584e908e01de47fde4761c7b15d566087d1d164a226e3f1b74a8
Score10/10-
Modifies WinLogon for persistence
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Possible privilege escalation attempt
-
Executes dropped EXE
-
Modifies file permissions
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-