Resubmissions
23-02-2024 17:14
240223-vr1h1seg8z 1023-02-2024 17:12
240223-vq45taeg8t 123-02-2024 17:03
240223-vk48madg45 823-02-2024 17:03
240223-vkpsyaeg2s 123-02-2024 16:59
240223-vhmkssef7z 623-02-2024 16:49
240223-vbvmtsde58 1023-02-2024 16:45
240223-t9wgcade26 423-02-2024 16:38
240223-t5gsdsdd24 623-02-2024 16:35
240223-t3x2ladc79 623-02-2024 16:33
240223-t22ndsec5v 1General
-
Target
MalwareDatabase
-
Size
285KB
-
Sample
240223-vr1h1seg8z
-
MD5
8adbc73e595f87a63b1efe9dc51ce993
-
SHA1
942d0f1b51055b5f0ae1f319c4509da66f8295d8
-
SHA256
3cc951ba5d33757ea90766b47a7174ed5b1c7600f5f47d418e3b1fcfabe54f7e
-
SHA512
c70bd77e192dc1c5da185d37b021c0cc23649512e8c9b9b46959fe488438ba3e8c4538bddd076ad232fc02e87727175bd15387c098b695c2f1556445bb0ec8ed
-
SSDEEP
6144:iDuqJ5fBrVSgE29xxspm0n1vuz3U9ovZJT3CqbMrhryfQNRPaCieMjAkvCJv1Vi/:afBrVSgE29xxspm0n1vuz3U9ovZJT3CU
Static task
static1
Malware Config
Targets
-
-
Target
MalwareDatabase
-
Size
285KB
-
MD5
8adbc73e595f87a63b1efe9dc51ce993
-
SHA1
942d0f1b51055b5f0ae1f319c4509da66f8295d8
-
SHA256
3cc951ba5d33757ea90766b47a7174ed5b1c7600f5f47d418e3b1fcfabe54f7e
-
SHA512
c70bd77e192dc1c5da185d37b021c0cc23649512e8c9b9b46959fe488438ba3e8c4538bddd076ad232fc02e87727175bd15387c098b695c2f1556445bb0ec8ed
-
SSDEEP
6144:iDuqJ5fBrVSgE29xxspm0n1vuz3U9ovZJT3CqbMrhryfQNRPaCieMjAkvCJv1Vi/:afBrVSgE29xxspm0n1vuz3U9ovZJT3CU
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Uses Session Manager for persistence
Creates Session Manager registry key to run executable early in system boot.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Registers COM server for autorun
-
Adds Run key to start application
-
Checks for any installed AV software in registry
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
4Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
4Defense Evasion
Impair Defenses
1Disable or Modify Tools
1Modify Registry
5Pre-OS Boot
1Bootkit
1