General
-
Target
00659ff2ad51d832f2eda13be257634fdb44399f38884e58a4901934396412fb
-
Size
240KB
-
Sample
240424-dtm72aed7z
-
MD5
e887588d2973fcc820d336bbb93f787f
-
SHA1
78619610a67d34588d77eabcc346a7a6c968b5d6
-
SHA256
00659ff2ad51d832f2eda13be257634fdb44399f38884e58a4901934396412fb
-
SHA512
61211b5aa7b3bf9892a390ab0c38b10e9f7064ec8fb9b93a9d62f5719e7dc06d281c731cd51546aa8b3d5332c0a36113304df87d40a33b015faefe65b0179c99
-
SSDEEP
6144:65r3lV6n42+3WSKhxD8RVo2rcaGKNqAwyotp2C:6C+3xWDY9IpKNTwyoB
Static task
static1
Behavioral task
behavioral1
Sample
00659ff2ad51d832f2eda13be257634fdb44399f38884e58a4901934396412fb.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
00659ff2ad51d832f2eda13be257634fdb44399f38884e58a4901934396412fb.dll
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
00659ff2ad51d832f2eda13be257634fdb44399f38884e58a4901934396412fb
-
Size
240KB
-
MD5
e887588d2973fcc820d336bbb93f787f
-
SHA1
78619610a67d34588d77eabcc346a7a6c968b5d6
-
SHA256
00659ff2ad51d832f2eda13be257634fdb44399f38884e58a4901934396412fb
-
SHA512
61211b5aa7b3bf9892a390ab0c38b10e9f7064ec8fb9b93a9d62f5719e7dc06d281c731cd51546aa8b3d5332c0a36113304df87d40a33b015faefe65b0179c99
-
SSDEEP
6144:65r3lV6n42+3WSKhxD8RVo2rcaGKNqAwyotp2C:6C+3xWDY9IpKNTwyoB
Score8/10-
Blocklisted process makes network request
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1