General
-
Target
Halter 2.0.exe
-
Size
124KB
-
Sample
240429-zvvjdscd8w
-
MD5
5e1c0b35d081323d20e4fc8f08fcb385
-
SHA1
a9b20e9ffbd46584b0b7ee909bac42db126d326b
-
SHA256
0daa00c594c009772857c77c75f0a714c577ee12ca85378ca93030bb8febd7b9
-
SHA512
460a11af88f596d4edc5b86a9baf8066aa9980b5e93da7554d9c77b2035839667a6fd7730eed86ac5dc981468a3b9876f05056e43839762aff0381d2201af853
-
SSDEEP
384:7lWtl2YrNxZRyk5GqHklWlZ/iLH++DEn4Pc+3KzmajxwMcIgbSpb77jf3aXymyMi:pQ6EEdhPczbfZfx7jva5+Hj
Static task
static1
Behavioral task
behavioral1
Sample
Halter 2.0.exe
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
Halter 2.0.exe
-
Size
124KB
-
MD5
5e1c0b35d081323d20e4fc8f08fcb385
-
SHA1
a9b20e9ffbd46584b0b7ee909bac42db126d326b
-
SHA256
0daa00c594c009772857c77c75f0a714c577ee12ca85378ca93030bb8febd7b9
-
SHA512
460a11af88f596d4edc5b86a9baf8066aa9980b5e93da7554d9c77b2035839667a6fd7730eed86ac5dc981468a3b9876f05056e43839762aff0381d2201af853
-
SSDEEP
384:7lWtl2YrNxZRyk5GqHklWlZ/iLH++DEn4Pc+3KzmajxwMcIgbSpb77jf3aXymyMi:pQ6EEdhPczbfZfx7jva5+Hj
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-