General

  • Target

    ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe.zip

  • Size

    434KB

  • Sample

    231231-bvp2xagae2

  • MD5

    4f30698770b7e0b698ed5e9a7cf4527f

  • SHA1

    0348cba7d711cbc7ea87ba66f44cb81a6c6caa65

  • SHA256

    a5e72bf5f831b8e5fcf8260961542ad69e1f0855c71d140c5aa2e887064d2703

  • SHA512

    8a85577e35c82f9f0cfcdae252cfe2297fac0c9c3117354db08f0f3cf832db34cbadf9624a5b877e4d075eac4ede97c74a29db54fa0cc7e06167095eefc439a7

  • SSDEEP

    12288:vZwEZKYVzSnxAeHEm0ZXR/DfWU2qsdEwg:BDlzSnxA2PUXR/D/2qgEwg

Malware Config

Targets

    • Target

      ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a.exe

    • Size

      798KB

    • MD5

      90aadf2247149996ae443e2c82af3730

    • SHA1

      050b7eba825412b24e3f02d76d7da5ae97e10502

    • SHA256

      ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a

    • SHA512

      eec32bb82b230dd309c29712e72d4469250e651449e127479d178eddbafd5a46ec8048a753bc2c1a0fdf1dc3ed72a9453ca66fb49cbf0f95a12704e5427182be

    • SSDEEP

      24576:Uj0JJ4p/A4npt3XojeQG5EtzRtO7GvmDguXd:UjoJ4u4zojegylDN

    • FlawedAmmyy RAT

      Remote-access trojan based on leaked code for the Ammyy remote admin software.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks