General
-
Target
SecuriteInfo.com.W64.Bulz.AY.gen.Eldorado.23576.26484.exe
-
Size
5.0MB
-
Sample
240201-e1yssabbe2
-
MD5
b8b966db021d7b8aaee6965b3dba4a28
-
SHA1
189ed55b5e1bef3f1f2fde5c092f70dc6779a3f6
-
SHA256
fc39e6cb0ae28dcd647eedbb041a5c9aa295b2db883232960ef0a48d86e93856
-
SHA512
02a14577c9623c5bd16870e9de0fde270f456f93666f23ad309bead398f7d3493b321a4281283bb632b38a5581c2a07c5697095ddef1ce14d80c5ef1abc4c6a3
-
SSDEEP
49152:jA/ljznTzE1IxDcrb/T8vO90d7HjmAFd4A64nsfJg5iz81LMyGBK1wVVE3+Yezze:4TzE1IxJu48Vi2zVSzEg+eRp
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.W64.Bulz.AY.gen.Eldorado.23576.26484.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.W64.Bulz.AY.gen.Eldorado.23576.26484.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
SecuriteInfo.com.W64.Bulz.AY.gen.Eldorado.23576.26484.exe
-
Size
5.0MB
-
MD5
b8b966db021d7b8aaee6965b3dba4a28
-
SHA1
189ed55b5e1bef3f1f2fde5c092f70dc6779a3f6
-
SHA256
fc39e6cb0ae28dcd647eedbb041a5c9aa295b2db883232960ef0a48d86e93856
-
SHA512
02a14577c9623c5bd16870e9de0fde270f456f93666f23ad309bead398f7d3493b321a4281283bb632b38a5581c2a07c5697095ddef1ce14d80c5ef1abc4c6a3
-
SSDEEP
49152:jA/ljznTzE1IxDcrb/T8vO90d7HjmAFd4A64nsfJg5iz81LMyGBK1wVVE3+Yezze:4TzE1IxJu48Vi2zVSzEg+eRp
Score8/10-
Blocklisted process makes network request
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Stops running service(s)
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2