General
-
Target
be17ed22dbc7afaf283dcdd1235556fe9422635211f1e877654ba5fdac6cb196
-
Size
405KB
-
Sample
240525-gbfxsagb33
-
MD5
7f0b1e2d00c4d53d30d18523137f6284
-
SHA1
dc80c43d7ef3cf5964e9fc7fe07ae5a992fec439
-
SHA256
be17ed22dbc7afaf283dcdd1235556fe9422635211f1e877654ba5fdac6cb196
-
SHA512
bbde7c475223c70942aba0c1622cd473ae7d370781f3a9885400b66237f43fc79640bf26ae1e3d32ff1d328243cdf997536f1f8534b1503a3ccf5b727e4afa0c
-
SSDEEP
6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4:gtRfJcNYFNm8UhlZGse
Static task
static1
Behavioral task
behavioral1
Sample
be17ed22dbc7afaf283dcdd1235556fe9422635211f1e877654ba5fdac6cb196.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
be17ed22dbc7afaf283dcdd1235556fe9422635211f1e877654ba5fdac6cb196.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
be17ed22dbc7afaf283dcdd1235556fe9422635211f1e877654ba5fdac6cb196
-
Size
405KB
-
MD5
7f0b1e2d00c4d53d30d18523137f6284
-
SHA1
dc80c43d7ef3cf5964e9fc7fe07ae5a992fec439
-
SHA256
be17ed22dbc7afaf283dcdd1235556fe9422635211f1e877654ba5fdac6cb196
-
SHA512
bbde7c475223c70942aba0c1622cd473ae7d370781f3a9885400b66237f43fc79640bf26ae1e3d32ff1d328243cdf997536f1f8534b1503a3ccf5b727e4afa0c
-
SSDEEP
6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4:gtRfJcNYFNm8UhlZGse
Score8/10-
Blocklisted process makes network request
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1