General

  • Target

    4415cb243f8d286c1f3bd5c65ffd74676c2b82346c1382072776e7fd9af0adfb

  • Size

    2.2MB

  • Sample

    240214-byeqcadg21

  • MD5

    74390010961d3820a3bbe428e1dfeb2a

  • SHA1

    c8ea3a284443e8c8e9c150f6310d4172f7a6a5f4

  • SHA256

    4415cb243f8d286c1f3bd5c65ffd74676c2b82346c1382072776e7fd9af0adfb

  • SHA512

    dcc776cec70e32e14d058611d4a26a7f3e150c80cc4c6c8dbd7e6d3f75561378d3e2c8a8bc1e60e973768f9ec3a91ce36a64474ab600299acdafc444aff60d76

  • SSDEEP

    49152:T2Gaeiwy+ImL3QaazZVUiXV36bTHMhdlP9lg+SeXLzgH2t2zeYwQjFBd:tatdTmL3Qaa0iFGTHajP9Pt32ze/QjFb

Score
7/10
upx

Malware Config

Targets

    • Target

      BOOTICE32.exe

    • Size

      416KB

    • MD5

      0e72509b2d5c55093e2c9ad141067644

    • SHA1

      4470a289016e2815777d3eec2bf7f985730249cd

    • SHA256

      a65ecb7bcb0fbc02ecc72300e10a36171c55ff322de5f6390669973bf49a2587

    • SHA512

      3ceebfc64649c7a325fbfdfefaeb437a742e005ab270ca614a2c3907b02cf61a55f42f0b1d9b0f66e2a4bffa22b29d6f64625ef03fd179958429303995be1b24

    • SSDEEP

      6144:3sdbaZx/8B+q2cWNIUHwHU/N2KBJXB8RPozWuhjkl24TOwx0/+pyjzI/oSbY:8V+++cWNRLv7kP2S2IuzI/oS0

    Score
    7/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Target

      BOOTICE64.exe

    • Size

      449KB

    • MD5

      7088a3708f85d3b62391cc1b6a3d5dd1

    • SHA1

      651b6a14700f3de500f0823d8e5d442bec54319d

    • SHA256

      ffecbb3a014f3e2030d318b1fd6bab48c812b049babc2bb66fb9bd2f0015d73a

    • SHA512

      52ce374dd4cbd5c7bfb7da86b81ff9da210d206fee328617f13965dee8f3fcb3fc5a277f54dea12f02b439daadf301f5c87a83abdf56d0741cebbc18bc9b61e6

    • SSDEEP

      12288:ntgGG7v1Ud2CYYM2luKCQkA+62oS5cgZ6p75DGm9pT9j:svC2CYY1RIKS5cgwpdam9nj

    Score
    7/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks