General
-
Target
a0c0c47393f3ff83fa0aff1c6b2066f064ffa74797592354bae7b4168e2b39f2
-
Size
184KB
-
Sample
240419-bkyajacc38
-
MD5
9e16daf81fa852538a26ffb4b10442c6
-
SHA1
f48a6c56ad470ce7056341af9b4c66c164d0c60f
-
SHA256
a0c0c47393f3ff83fa0aff1c6b2066f064ffa74797592354bae7b4168e2b39f2
-
SHA512
2f1973de33632516af186eb9d316f4651cdd14b21995342168f03d6367edfc2b80cb384e1b2b7a576aa1ff8a4cdb51bea4827e35a3d424bf8fcb690ab2127934
-
SSDEEP
3072:YXFF+uZRl3zKTG1PZvbnkE8OCtR6kX4nxtR8RtzR6Vj5FwwTlZ:Y1FJZDKG1P1zkEDER6kXAtqEVjc4P
Static task
static1
Behavioral task
behavioral1
Sample
a0c0c47393f3ff83fa0aff1c6b2066f064ffa74797592354bae7b4168e2b39f2.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a0c0c47393f3ff83fa0aff1c6b2066f064ffa74797592354bae7b4168e2b39f2.dll
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
a0c0c47393f3ff83fa0aff1c6b2066f064ffa74797592354bae7b4168e2b39f2
-
Size
184KB
-
MD5
9e16daf81fa852538a26ffb4b10442c6
-
SHA1
f48a6c56ad470ce7056341af9b4c66c164d0c60f
-
SHA256
a0c0c47393f3ff83fa0aff1c6b2066f064ffa74797592354bae7b4168e2b39f2
-
SHA512
2f1973de33632516af186eb9d316f4651cdd14b21995342168f03d6367edfc2b80cb384e1b2b7a576aa1ff8a4cdb51bea4827e35a3d424bf8fcb690ab2127934
-
SSDEEP
3072:YXFF+uZRl3zKTG1PZvbnkE8OCtR6kX4nxtR8RtzR6Vj5FwwTlZ:Y1FJZDKG1P1zkEDER6kXAtqEVjc4P
Score9/10-
Detects executables containing base64 encoded User Agent
-
Blocklisted process makes network request
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1