General
-
Target
sample
-
Size
20KB
-
Sample
240503-tf5g6ade47
-
MD5
170c9de7c0e854c7c329fcb10ce0639a
-
SHA1
6f1be01abd2bf70d9cd3c4572150ded661845d8e
-
SHA256
86672606e2c825d037b853e4d452826f4b2c8e99e73295c66073b43c68aad11a
-
SHA512
15ba7d73d8fae8badc8546a23f0dec38fb476972ae0d1c83d3551d1d1e4e63fae51b01e25dc35a0a7ce815f1a386e0b43d2f8b0fb7aeac868eb57912bf83126d
-
SSDEEP
384:roN7VzbCFDpmReVoOs4yi9ylKeGMaU8HhhbKrui77S2LjMrSb+0IJCgMmVn:ro7iBVoOs4ymyI1MQBhbYBrMrSeJ2mVn
Static task
static1
Malware Config
Targets
-
-
Target
sample
-
Size
20KB
-
MD5
170c9de7c0e854c7c329fcb10ce0639a
-
SHA1
6f1be01abd2bf70d9cd3c4572150ded661845d8e
-
SHA256
86672606e2c825d037b853e4d452826f4b2c8e99e73295c66073b43c68aad11a
-
SHA512
15ba7d73d8fae8badc8546a23f0dec38fb476972ae0d1c83d3551d1d1e4e63fae51b01e25dc35a0a7ce815f1a386e0b43d2f8b0fb7aeac868eb57912bf83126d
-
SSDEEP
384:roN7VzbCFDpmReVoOs4yi9ylKeGMaU8HhhbKrui77S2LjMrSb+0IJCgMmVn:ro7iBVoOs4ymyI1MQBhbYBrMrSeJ2mVn
-
Disables Task Manager via registry modification
-
Possible privilege escalation attempt
-
Executes dropped EXE
-
Modifies file permissions
-
Legitimate hosting services abused for malware hosting/C2
-
Modifies boot configuration data using bcdedit
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-