General

  • Target

    Vulkan (5).zip

  • Size

    272KB

  • Sample

    240305-sgbe2aae98

  • MD5

    a7e2f1cb01fa11556728839ce618a86a

  • SHA1

    4679ca7bcddcb065dcee001d68416f2441fcae35

  • SHA256

    0b8f6828dd6e5457671a799456e45e9a4a1e26a9f120d563cfb05d5e13f20196

  • SHA512

    00298f12f2a6144ce43e266f6c74376b2fac52d355f9c997e3cdad24651662adefac7051fc051d9ebcc3ce6eeb9f85b99572f2f777a46b5c650994bf1d028d29

  • SSDEEP

    6144:oOrsuyQR0IUK1lJlaosg8khgtA0000Lyxpo/Wvs:ovk1vU9g8Ltp50LSpvU

Score
7/10

Malware Config

Targets

    • Target

      Vulkan/Assets/Bootstrapper.exe

    • Size

      198KB

    • MD5

      3a61d18866ec289415e213ab5d34de69

    • SHA1

      83c29a47600dc00feb87954418e3873edd42e4aa

    • SHA256

      e5807f713d9b89a54c8916d30705401e82c83b74a3b195db5b399e90ff945ce1

    • SHA512

      a88d52d94acf8ee8858bad9dadebadd7c0d09572f459f28d01fef35c9dd1b5af51a96a2b13b4b5fbea8e483c2832d3a6d4a0cc9b60ebbe343a8c65c0de8d2ed4

    • SSDEEP

      1536:96R6ONuvr2zhBIEMUkwV/n1EnXONHLfE6XZ3bU9dbJOOI:buh/fP1EXyzsOT

    Score
    7/10
    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

    • Target

      Vulkan/Launch.lnk

    • Size

      1KB

    • MD5

      b0c64121ad2b9c9db52db5ceef6c7a73

    • SHA1

      aa893decdb1a86a09687cb8a9aa19a686643ddc0

    • SHA256

      347f03b54b58fa6806711253195ca8ea44679c7a8a3af8a262b1347248d36953

    • SHA512

      3effa3659cf3c5b27100f4c1f025a1d9711ac8a7f93463dc815dd258bfd6ff1906d68de39f9670b79112fd1b68a89ec8f409409313cabb717b4f5eb97556b63d

    Score
    7/10
    • Executes dropped EXE

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks