General

  • Target

    victoryforog.wav

  • Size

    905KB

  • Sample

    240214-xg6cmaac2x

  • MD5

    2118c4917f946774c2882c787e24aaa1

  • SHA1

    a4acd2141a910751f83a2f8edfb4a88d58a06a5a

  • SHA256

    8df36ba59f97b2d8700ba4a941b35f83d90fce1538743f99802bb3f1c77dd7f7

  • SHA512

    0dedd147b8a9ed4c8b081574c67bf723ae6a0120c48b53fb1d5d511e6346b90f4652265344f58963ff7359fb5aea624e2a52efcecc715206acd594fca4542a82

  • SSDEEP

    24576:4v/bmx1UUQOtNavjrA2uI1mcHPju67TdrTw3gRl2UOE:GM1U3SkbrA2uI1vHPju67TdrMc

Score
6/10

Malware Config

Targets

    • Target

      victoryforog.wav

    • Size

      905KB

    • MD5

      2118c4917f946774c2882c787e24aaa1

    • SHA1

      a4acd2141a910751f83a2f8edfb4a88d58a06a5a

    • SHA256

      8df36ba59f97b2d8700ba4a941b35f83d90fce1538743f99802bb3f1c77dd7f7

    • SHA512

      0dedd147b8a9ed4c8b081574c67bf723ae6a0120c48b53fb1d5d511e6346b90f4652265344f58963ff7359fb5aea624e2a52efcecc715206acd594fca4542a82

    • SSDEEP

      24576:4v/bmx1UUQOtNavjrA2uI1mcHPju67TdrTw3gRl2UOE:GM1U3SkbrA2uI1vHPju67TdrMc

    Score
    6/10
    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks