General
-
Target
Itachi14.exe
-
Size
3.7MB
-
Sample
240518-rn9ezaff85
-
MD5
24993cbce166b6aa35ac53606afeea76
-
SHA1
26a221cafc577aed7d2939b36b9d7b2007043c5d
-
SHA256
a1e14a5e8c81492585b8ad41bc7aea4a3200661d06ffcfb8ac633770d94316df
-
SHA512
22a790af2876420f00a21fbe9c9c8749d74c1de2aae964b9987b7ce9242574933f4b929cd5f9e124670f89b4db11d958e6353f2033d92b3f409c161510808f28
-
SSDEEP
98304:o5gjbnI3OkLFxD5tKZDunjxynuzSnsmtk2aCwdMK0UsBDvRmvpLICugLPdGf9N+2:pLNw0UCvNMPcz+B0UCvNMPcz+/LN
Static task
static1
Malware Config
Targets
-
-
Target
Itachi14.exe
-
Size
3.7MB
-
MD5
24993cbce166b6aa35ac53606afeea76
-
SHA1
26a221cafc577aed7d2939b36b9d7b2007043c5d
-
SHA256
a1e14a5e8c81492585b8ad41bc7aea4a3200661d06ffcfb8ac633770d94316df
-
SHA512
22a790af2876420f00a21fbe9c9c8749d74c1de2aae964b9987b7ce9242574933f4b929cd5f9e124670f89b4db11d958e6353f2033d92b3f409c161510808f28
-
SSDEEP
98304:o5gjbnI3OkLFxD5tKZDunjxynuzSnsmtk2aCwdMK0UsBDvRmvpLICugLPdGf9N+2:pLNw0UCvNMPcz+B0UCvNMPcz+/LN
-
Modifies WinLogon for persistence
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Possible privilege escalation attempt
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1