General

  • Target

    ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe.zip

  • Size

    434KB

  • Sample

    231031-rc586shc4t

  • MD5

    3c48f62b54c3d3618cd5a8e2e3d2d8f9

  • SHA1

    c3998cd3d9d6d01da0302e4dd563645e16f0c72e

  • SHA256

    1b775f652ddda4985cdee327095f4506f9f0a4ebd876b9e8ab2010742e099147

  • SHA512

    291f0eab9fe1a7cdc16fae739931ce31ec600e9b8f3027221b4922e69adcacfb7eb546b76ebcbec5afcf85df08ce019d7538054b0e38ecd7c0763c2f127f8c31

  • SSDEEP

    12288:wtXSPOu8E0lCqRMYAnWsS2ySPJS+1HdhcCmTPVWnJT7n6KUVl2UA:wtX4r/qRMyPqV19h6VWJv2VG

Malware Config

Targets

    • Target

      ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe

    • Size

      798KB

    • MD5

      90aadf2247149996ae443e2c82af3730

    • SHA1

      050b7eba825412b24e3f02d76d7da5ae97e10502

    • SHA256

      ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a

    • SHA512

      eec32bb82b230dd309c29712e72d4469250e651449e127479d178eddbafd5a46ec8048a753bc2c1a0fdf1dc3ed72a9453ca66fb49cbf0f95a12704e5427182be

    • SSDEEP

      24576:Uj0JJ4p/A4npt3XojeQG5EtzRtO7GvmDguXd:UjoJ4u4zojegylDN

    • FlawedAmmyy RAT

      Remote-access trojan based on leaked code for the Ammyy remote admin software.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks