General

  • Target

    bb5c4ac10436c7ea30ecc9bf592f4920_NEAS

  • Size

    804KB

  • Sample

    240507-r2mhcseb64

  • MD5

    bb5c4ac10436c7ea30ecc9bf592f4920

  • SHA1

    ebfdc9c89c75f0b373ad12d3c869fa0879413602

  • SHA256

    7f1013da1776156b27d8f3e92f2d19c312f780da00bc8513cb07e057950fbde9

  • SHA512

    fe6380622edc5484ce8f9417cd6c56122969908a6786167721fe05de33b7a98eb62c83b2945eed8828d4340e00588471ba74226f59d9cf3bc2834f8cb1fdb650

  • SSDEEP

    12288:hGeqVjCyD966/JD18wSGTCNzXj9Jb8hniDysn/yttPX2lOlz:UeZG/lutzj9Jb8hn8x/yttPGlCz

Score
6/10

Malware Config

Targets

    • Target

      bb5c4ac10436c7ea30ecc9bf592f4920_NEAS

    • Size

      804KB

    • MD5

      bb5c4ac10436c7ea30ecc9bf592f4920

    • SHA1

      ebfdc9c89c75f0b373ad12d3c869fa0879413602

    • SHA256

      7f1013da1776156b27d8f3e92f2d19c312f780da00bc8513cb07e057950fbde9

    • SHA512

      fe6380622edc5484ce8f9417cd6c56122969908a6786167721fe05de33b7a98eb62c83b2945eed8828d4340e00588471ba74226f59d9cf3bc2834f8cb1fdb650

    • SSDEEP

      12288:hGeqVjCyD966/JD18wSGTCNzXj9Jb8hniDysn/yttPX2lOlz:UeZG/lutzj9Jb8hn8x/yttPGlCz

    Score
    6/10
    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks