General
-
Target
victoryforog.wav
-
Size
905KB
-
Sample
240214-xg6cmaac2x
-
MD5
2118c4917f946774c2882c787e24aaa1
-
SHA1
a4acd2141a910751f83a2f8edfb4a88d58a06a5a
-
SHA256
8df36ba59f97b2d8700ba4a941b35f83d90fce1538743f99802bb3f1c77dd7f7
-
SHA512
0dedd147b8a9ed4c8b081574c67bf723ae6a0120c48b53fb1d5d511e6346b90f4652265344f58963ff7359fb5aea624e2a52efcecc715206acd594fca4542a82
-
SSDEEP
24576:4v/bmx1UUQOtNavjrA2uI1mcHPju67TdrTw3gRl2UOE:GM1U3SkbrA2uI1vHPju67TdrMc
Static task
static1
Behavioral task
behavioral1
Sample
victoryforog.wav
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
victoryforog.wav
-
Size
905KB
-
MD5
2118c4917f946774c2882c787e24aaa1
-
SHA1
a4acd2141a910751f83a2f8edfb4a88d58a06a5a
-
SHA256
8df36ba59f97b2d8700ba4a941b35f83d90fce1538743f99802bb3f1c77dd7f7
-
SHA512
0dedd147b8a9ed4c8b081574c67bf723ae6a0120c48b53fb1d5d511e6346b90f4652265344f58963ff7359fb5aea624e2a52efcecc715206acd594fca4542a82
-
SSDEEP
24576:4v/bmx1UUQOtNavjrA2uI1mcHPju67TdrTw3gRl2UOE:GM1U3SkbrA2uI1vHPju67TdrMc
Score6/10-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-