General
-
Target
9cf0001742aaa3ee11ce24319413a6ed90d98e4cedfc22f4450511c655eb0af4
-
Size
240KB
-
Sample
240409-bbmsfahb73
-
MD5
48680df732ecb3518aa228f93966d94a
-
SHA1
8bf93a734ac554e7e4492958c3e54f3232acd346
-
SHA256
9cf0001742aaa3ee11ce24319413a6ed90d98e4cedfc22f4450511c655eb0af4
-
SHA512
83ee67128e4860fe0b4940f780e7b5a503141748228ed0986d87388463079d41eb8f8617c28f766292808763b8bfe81872314f59232fc82fd85da7655ce5eb11
-
SSDEEP
6144:65r3lV6n42+3WSKhxD8RVo2rcaGKNqAwyotp2J:6C+3xWDY9IpKNTwyoq
Static task
static1
Behavioral task
behavioral1
Sample
9cf0001742aaa3ee11ce24319413a6ed90d98e4cedfc22f4450511c655eb0af4.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
9cf0001742aaa3ee11ce24319413a6ed90d98e4cedfc22f4450511c655eb0af4.dll
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
9cf0001742aaa3ee11ce24319413a6ed90d98e4cedfc22f4450511c655eb0af4
-
Size
240KB
-
MD5
48680df732ecb3518aa228f93966d94a
-
SHA1
8bf93a734ac554e7e4492958c3e54f3232acd346
-
SHA256
9cf0001742aaa3ee11ce24319413a6ed90d98e4cedfc22f4450511c655eb0af4
-
SHA512
83ee67128e4860fe0b4940f780e7b5a503141748228ed0986d87388463079d41eb8f8617c28f766292808763b8bfe81872314f59232fc82fd85da7655ce5eb11
-
SSDEEP
6144:65r3lV6n42+3WSKhxD8RVo2rcaGKNqAwyotp2J:6C+3xWDY9IpKNTwyoq
Score8/10-
Blocklisted process makes network request
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1