General

  • Target

    783c11b4d2ea43e7f1e02b4658945276

  • Size

    180KB

  • Sample

    240126-ygz2aadbe4

  • MD5

    783c11b4d2ea43e7f1e02b4658945276

  • SHA1

    7588782943660bfdad705338981f1b6821f0c085

  • SHA256

    63eee8f8decb3dc7d151b7dc05b72ce34da1d259033a3c9ceb7a7919dffa389b

  • SHA512

    5ce4c89163b427f54187789e37ebe0a33ed52f24495309b4e0b148e0a3b905f834c1449c88ba8a30f7bef040b00581ea1108658373906930d4d2038602915753

  • SSDEEP

    3072:6B2/wff+3RsAsIluMxBzYxv9hmw0I9CXcMBZrfwpC5:6ao+3RdLvYxlhBEBZrfwpC

Malware Config

Targets

    • Target

      783c11b4d2ea43e7f1e02b4658945276

    • Size

      180KB

    • MD5

      783c11b4d2ea43e7f1e02b4658945276

    • SHA1

      7588782943660bfdad705338981f1b6821f0c085

    • SHA256

      63eee8f8decb3dc7d151b7dc05b72ce34da1d259033a3c9ceb7a7919dffa389b

    • SHA512

      5ce4c89163b427f54187789e37ebe0a33ed52f24495309b4e0b148e0a3b905f834c1449c88ba8a30f7bef040b00581ea1108658373906930d4d2038602915753

    • SSDEEP

      3072:6B2/wff+3RsAsIluMxBzYxv9hmw0I9CXcMBZrfwpC5:6ao+3RdLvYxlhBEBZrfwpC

    • Adds policy Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks