General

  • Target

    paskaviirus.zip

  • Size

    2.4MB

  • Sample

    240219-pxyzgsdc6s

  • MD5

    5ca99a511e8360eb8cbf9033c089a12a

  • SHA1

    e13977ecc65c01521d7b9236b5e28d893bf128c1

  • SHA256

    8a2ce73213f3710e6eaeab1b88fd6226d48784202aa8519052dd5d0a496b2c8d

  • SHA512

    a5b5207f97ea61aae067762593bc6d8a873f22a82a3609f453023358ff9e0e5f2dba839c8880ff0f9c79298de102aaf30d4265dfebfdd76e2058ca5d153e7c6f

  • SSDEEP

    49152:1MBZtaFMWzwfXJcY1g8FdMVo3NBG3luTNGzFirEBPfBhZ/VDMFL4dkyv9AqpO:1M7taFyf5cIg8Fdqb3l0Izq0IFL4W+AV

Malware Config

Targets

    • Target

      a70960bf2f6c34be8a5012aac3422e699aa3c10531e04a625c576ad2d466d4ba.msi

    • Size

      2.6MB

    • MD5

      610532c09c6d0861380e56146778445e

    • SHA1

      03b822930c67bf6db0c14e99a9c1af259b4b8a85

    • SHA256

      a70960bf2f6c34be8a5012aac3422e699aa3c10531e04a625c576ad2d466d4ba

    • SHA512

      5a911b95d588aecb8f71528caecf6dc735b8a3ece3602f8156a94ee583491f2408404dd9bbb0927e9fea76a51793367ea15fc45f70d651d41de1f81280c200e5

    • SSDEEP

      49152:051VAM5R2KAHlcp8qFmmzDza2Rqr+kMdPTEe/pjO8xn+ch/TlOFNOnUI:0PCMr2NMRmk/XeM9TEeRvx+ch/TlAr

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks