General
-
Target
20bc2a20670ed6275c14515d59ca47c079d409ee34a1ed1796a99279302a8416
-
Size
404KB
-
Sample
240509-dvd1raae96
-
MD5
a387f06af0a3fbbe213b2da2175ea277
-
SHA1
82f49ca8c3497de6bbb3d23dcc90edebd28e6d0a
-
SHA256
20bc2a20670ed6275c14515d59ca47c079d409ee34a1ed1796a99279302a8416
-
SHA512
a7c01a6e74d6258bf39120c9568888da0ca7b827da61850bc041613fbc80a761b433e3ce0ab759c02559eed68ed6877e1b51fc5e8edb4847af7e42782835a37d
-
SSDEEP
6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4:gtRfJcNYFNm8UhlZGse
Static task
static1
Behavioral task
behavioral1
Sample
20bc2a20670ed6275c14515d59ca47c079d409ee34a1ed1796a99279302a8416.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
20bc2a20670ed6275c14515d59ca47c079d409ee34a1ed1796a99279302a8416.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
20bc2a20670ed6275c14515d59ca47c079d409ee34a1ed1796a99279302a8416
-
Size
404KB
-
MD5
a387f06af0a3fbbe213b2da2175ea277
-
SHA1
82f49ca8c3497de6bbb3d23dcc90edebd28e6d0a
-
SHA256
20bc2a20670ed6275c14515d59ca47c079d409ee34a1ed1796a99279302a8416
-
SHA512
a7c01a6e74d6258bf39120c9568888da0ca7b827da61850bc041613fbc80a761b433e3ce0ab759c02559eed68ed6877e1b51fc5e8edb4847af7e42782835a37d
-
SSDEEP
6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4:gtRfJcNYFNm8UhlZGse
Score8/10-
Blocklisted process makes network request
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1