General

  • Target

    bloknot.exe

  • Size

    242KB

  • Sample

    231014-phbweadh3v

  • MD5

    2db6b8c908e6e44bda6c6aef6179e5bf

  • SHA1

    c5f14cd93399049e2ae81cbca7baf63e7b83d56f

  • SHA256

    33da988c25f79c4a00f1d5facacb53ee1d24a9dc087034caafdcc79eda462689

  • SHA512

    8d0baee4906c172dcb42fe801d743e205441865c4a113f6273d2de29c1a68660782d50cf6929e94b8f069cb31613eec8a5e36a691509860ca9fbb09cb5a0b168

  • SSDEEP

    3072:QagdEByMuZJ/+oNbynzrVCd/e39IjqwBSArDrvD3buZcbjskkkdjg0uiy:QUByrr+oyzro4UDrvXulkkkdjgziy

Score
8/10

Malware Config

Targets

    • Target

      bloknot.exe

    • Size

      242KB

    • MD5

      2db6b8c908e6e44bda6c6aef6179e5bf

    • SHA1

      c5f14cd93399049e2ae81cbca7baf63e7b83d56f

    • SHA256

      33da988c25f79c4a00f1d5facacb53ee1d24a9dc087034caafdcc79eda462689

    • SHA512

      8d0baee4906c172dcb42fe801d743e205441865c4a113f6273d2de29c1a68660782d50cf6929e94b8f069cb31613eec8a5e36a691509860ca9fbb09cb5a0b168

    • SSDEEP

      3072:QagdEByMuZJ/+oNbynzrVCd/e39IjqwBSArDrvD3buZcbjskkkdjg0uiy:QUByrr+oyzro4UDrvXulkkkdjgziy

    Score
    8/10
    • Modifies Installed Components in the registry

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks