General
-
Target
a39fde5dd2e3eeee0999bb6cc101861f34ee73d8974bf8e9b1814a10432879d6
-
Size
188KB
-
Sample
240420-bcm5lada5t
-
MD5
a448d5da2fcddcd396f2b00af8e32c31
-
SHA1
6e52f689427e438bfa9240299903ffc6fc77baca
-
SHA256
a39fde5dd2e3eeee0999bb6cc101861f34ee73d8974bf8e9b1814a10432879d6
-
SHA512
8ee6f3aad08256a0e83772c357dc709e94756dbdf490680c9356a1b015fb867ea699f1189b372d67f5e1230b36422638816813d72df308d32f93f9f0d5c5f3a9
-
SSDEEP
3072:Cri0+utSCXQJdqByftkViecNemfh0N5Wlu/gX6ASMqsCAn+/B87CVKrNyGTbj:CyrJdqByftkVbgQen+p7obTbj
Static task
static1
Behavioral task
behavioral1
Sample
a39fde5dd2e3eeee0999bb6cc101861f34ee73d8974bf8e9b1814a10432879d6.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a39fde5dd2e3eeee0999bb6cc101861f34ee73d8974bf8e9b1814a10432879d6.dll
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
a39fde5dd2e3eeee0999bb6cc101861f34ee73d8974bf8e9b1814a10432879d6
-
Size
188KB
-
MD5
a448d5da2fcddcd396f2b00af8e32c31
-
SHA1
6e52f689427e438bfa9240299903ffc6fc77baca
-
SHA256
a39fde5dd2e3eeee0999bb6cc101861f34ee73d8974bf8e9b1814a10432879d6
-
SHA512
8ee6f3aad08256a0e83772c357dc709e94756dbdf490680c9356a1b015fb867ea699f1189b372d67f5e1230b36422638816813d72df308d32f93f9f0d5c5f3a9
-
SSDEEP
3072:Cri0+utSCXQJdqByftkViecNemfh0N5Wlu/gX6ASMqsCAn+/B87CVKrNyGTbj:CyrJdqByftkVbgQen+p7obTbj
Score9/10-
Detects executables containing base64 encoded User Agent
-
Blocklisted process makes network request
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1