General

  • Target

    SSU(1).msi

  • Size

    444KB

  • Sample

    240511-qag8wsha9y

  • MD5

    314a43278376557ef8d9d0c6212fb2c8

  • SHA1

    215199d4b9e14dde22c13a95583f1d8b70add5dd

  • SHA256

    07c5ef50753ddb404b9ac1dcf0e6b2e611bd017df879995f865f07e5698caa0c

  • SHA512

    019baf1af9e0d444f357684cc921cea68c52091967fb3652097a264cee3971e93d13b70ae66ab1e52f94fd88c14b9379cc239a1fdc7834c3586244a25f7c417e

  • SSDEEP

    12288:NF6siOAjzFpv5loz+8jOZy2KsGU6a4Ksh:WV3/FpChOE2Z34K6

Score
6/10

Malware Config

Targets

    • Target

      SSU(1).msi

    • Size

      444KB

    • MD5

      314a43278376557ef8d9d0c6212fb2c8

    • SHA1

      215199d4b9e14dde22c13a95583f1d8b70add5dd

    • SHA256

      07c5ef50753ddb404b9ac1dcf0e6b2e611bd017df879995f865f07e5698caa0c

    • SHA512

      019baf1af9e0d444f357684cc921cea68c52091967fb3652097a264cee3971e93d13b70ae66ab1e52f94fd88c14b9379cc239a1fdc7834c3586244a25f7c417e

    • SSDEEP

      12288:NF6siOAjzFpv5loz+8jOZy2KsGU6a4Ksh:WV3/FpChOE2Z34K6

    Score
    6/10
    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks