General
-
Target
WIT_x86.exe
-
Size
1.2MB
-
Sample
240510-pfppgsdg3t
-
MD5
1542a5fdb7a10000a04b70165b93bb3d
-
SHA1
5564a78cf371472c27adab8ce688d309b32b1919
-
SHA256
9b82d8b038625114be5724e71ca45fe31b843dff5d8b7c99b40977f8f033cc7c
-
SHA512
55288af0d765e852680f1ed96e397d98f819fbf8352e0cb517944583482bdf0304fd3067a48c72a25c649a59caa547df9ff1a39a584ed432c16da88709278c93
-
SSDEEP
24576:W/TcK4z+kLwkoXiXMAj2Ygk5J/wgh+y59JPdFpeID:W/YbTLoSXM+2YL/V959JPl
Static task
static1
Behavioral task
behavioral1
Sample
WIT_x86.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
WIT_x86.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
WIT_x86.exe
-
Size
1.2MB
-
MD5
1542a5fdb7a10000a04b70165b93bb3d
-
SHA1
5564a78cf371472c27adab8ce688d309b32b1919
-
SHA256
9b82d8b038625114be5724e71ca45fe31b843dff5d8b7c99b40977f8f033cc7c
-
SHA512
55288af0d765e852680f1ed96e397d98f819fbf8352e0cb517944583482bdf0304fd3067a48c72a25c649a59caa547df9ff1a39a584ed432c16da88709278c93
-
SSDEEP
24576:W/TcK4z+kLwkoXiXMAj2Ygk5J/wgh+y59JPdFpeID:W/YbTLoSXM+2YL/V959JPl
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Modifies boot configuration data using bcdedit
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-