Analysis
-
max time kernel
97s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 12:25
Static task
static1
Behavioral task
behavioral1
Sample
6e51e176aa81c4cd22da054905433896.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6e51e176aa81c4cd22da054905433896.exe
Resource
win10v2004-20231222-en
General
-
Target
6e51e176aa81c4cd22da054905433896.exe
-
Size
455KB
-
MD5
6e51e176aa81c4cd22da054905433896
-
SHA1
8eac495144f8d4b8338b6a94b35958364bbe9530
-
SHA256
fbc6b20d7e994e9b1e7d675d69af0d0e355bae3ee7b67c1238cd716985d4ca96
-
SHA512
13b0d210a9fa972c50d80ec5b419762be24c3bdcc5987270e2a95dd9f3d58bd199ba9537fc8bd64ccb637877a04b96521a6f88fe1cc7c3bcf3689c94a659a077
-
SSDEEP
6144:a0dWZ+RxpJZCP9jZOomZJCaHzyzYiMGwG0aHA+mOBYEUwfVFrK:a0dfRxpJZWAL8MGwG0smOBsiF+
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\t: 6e51e176aa81c4cd22da054905433896.exe File opened (read-only) \??\u: 6e51e176aa81c4cd22da054905433896.exe File opened (read-only) \??\w: 6e51e176aa81c4cd22da054905433896.exe File opened (read-only) \??\h: 6e51e176aa81c4cd22da054905433896.exe File opened (read-only) \??\k: 6e51e176aa81c4cd22da054905433896.exe File opened (read-only) \??\l: 6e51e176aa81c4cd22da054905433896.exe File opened (read-only) \??\y: 6e51e176aa81c4cd22da054905433896.exe File opened (read-only) \??\z: 6e51e176aa81c4cd22da054905433896.exe File opened (read-only) \??\g: 6e51e176aa81c4cd22da054905433896.exe File opened (read-only) \??\r: 6e51e176aa81c4cd22da054905433896.exe File opened (read-only) \??\x: 6e51e176aa81c4cd22da054905433896.exe File opened (read-only) \??\v: 6e51e176aa81c4cd22da054905433896.exe File opened (read-only) \??\e: 6e51e176aa81c4cd22da054905433896.exe File opened (read-only) \??\o: 6e51e176aa81c4cd22da054905433896.exe File opened (read-only) \??\q: 6e51e176aa81c4cd22da054905433896.exe File opened (read-only) \??\n: 6e51e176aa81c4cd22da054905433896.exe File opened (read-only) \??\p: 6e51e176aa81c4cd22da054905433896.exe File opened (read-only) \??\s: 6e51e176aa81c4cd22da054905433896.exe File opened (read-only) \??\i: 6e51e176aa81c4cd22da054905433896.exe File opened (read-only) \??\j: 6e51e176aa81c4cd22da054905433896.exe File opened (read-only) \??\m: 6e51e176aa81c4cd22da054905433896.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 6e51e176aa81c4cd22da054905433896.exe